General
-
Target
UDS-Trojan.Multi.GenericML.xnet-ef95c0b829c2aad4eca365fb9b37719b51f5d8ab518a2ccac920ef65852982d1.exe
-
Size
4.4MB
-
Sample
220920-fppw6scac9
-
MD5
a83040b851cf14288d3262d2bd4460fc
-
SHA1
bac8269c66d5b0ca2c5487eb3366c910c99a67e1
-
SHA256
ef95c0b829c2aad4eca365fb9b37719b51f5d8ab518a2ccac920ef65852982d1
-
SHA512
89848ac37b274bcdf55cbba3b0dd46013de75563a95ed197d42269a2c1c3c2f62c935f24e8db2a912d5cbfd808575dff12d9141eaea3b103cc4bb7707b1cda8e
-
SSDEEP
98304:6MNbfTJlGuc3B57vYT8A7X27aKc736CtbL8RdwZkid1W5:nN7tvcjUT8A7X219uKdw2B
Static task
static1
Behavioral task
behavioral1
Sample
UDS-Trojan.Multi.GenericML.xnet-ef95c0b829c2aad4eca365fb9b37719b51f5d8ab518a2ccac920ef65852982d1.exe
Resource
win7-20220812-en
Malware Config
Extracted
C:\Users\Admin\Desktop\DECRYPT-FILES.TXT
http://mail2tor2zyjdctd.onion/
Targets
-
-
Target
UDS-Trojan.Multi.GenericML.xnet-ef95c0b829c2aad4eca365fb9b37719b51f5d8ab518a2ccac920ef65852982d1.exe
-
Size
4.4MB
-
MD5
a83040b851cf14288d3262d2bd4460fc
-
SHA1
bac8269c66d5b0ca2c5487eb3366c910c99a67e1
-
SHA256
ef95c0b829c2aad4eca365fb9b37719b51f5d8ab518a2ccac920ef65852982d1
-
SHA512
89848ac37b274bcdf55cbba3b0dd46013de75563a95ed197d42269a2c1c3c2f62c935f24e8db2a912d5cbfd808575dff12d9141eaea3b103cc4bb7707b1cda8e
-
SSDEEP
98304:6MNbfTJlGuc3B57vYT8A7X27aKc736CtbL8RdwZkid1W5:nN7tvcjUT8A7X219uKdw2B
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Disables Task Manager via registry modification
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Possible privilege escalation attempt
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Modifies file permissions
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-