General
-
Target
Fast.bin.zip
-
Size
39KB
-
Sample
220924-kmr1zaahc7
-
MD5
4b90892716ee0ae65986099d616e82a3
-
SHA1
37439c11891d8eb495e5abd7e2b8a7aa3f4b7f25
-
SHA256
f2952dd43ded68b9f3272de4ae385f2118878e1c9e747ee3a0619112e3372246
-
SHA512
a1e1c3c802783041da009cfebfbabc8cefd4e9f26a921b825c5e1decec8ecd0cebe307a6dc585c637d6005e8b967d26183a1fdbde5cde5e1be5327be5ae41f67
-
SSDEEP
768:RsIm+wv3/I2Md7Vhq+uGTQzkR1QiPTTsMuZSx+S6wvyGV6GtoUexM:RQ+W3A2SHqBGTgkLQirTsmx+S5LlIM
Static task
static1
Behavioral task
behavioral1
Sample
Fast.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Fast.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
C:\info.hta
Extracted
C:\info.hta
Targets
-
-
Target
Fast.bin
-
Size
57KB
-
MD5
c3ffee9d1b907cdd19e5130a24abf4a4
-
SHA1
1687bf3e971b06bc9f0052185472a358b3ffbc6d
-
SHA256
0e82db485f3e272b47ea1f058a16bdff5eb2f504e1262a2a40abe0f1827082c8
-
SHA512
10f2f4efa957c9dc777fe082baed9c3f93061fdf41f972ff4cee3f35eb1a68b0bb96e9531c4b6dbabd37f7247ba3a6c02b07b4656b273f623ef8b1150a253ae1
-
SSDEEP
1536:NNeRBl5PT/rx1mzwRMSTdLpJrtwuQ3U2:NQRrmzwR5Ju3U2
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies boot configuration data using bcdedit
-
Modifies Windows Firewall
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-