General
-
Target
HEUR-Trojan-Ransom.Win32.Generic-6d7c489b15d82273b057d89b1a142d92caaf735b11b74ffb55348cb5e92d2bf6.exe
-
Size
62KB
-
Sample
220925-e6hnraeefm
-
MD5
7e7111b32a1cee99edecd646ca1d5440
-
SHA1
7a10a266ad25572201ae4166cff7f1d67e8c9365
-
SHA256
6d7c489b15d82273b057d89b1a142d92caaf735b11b74ffb55348cb5e92d2bf6
-
SHA512
af94778652a77b918032f198cb917451b0c2fd9f91d1a9360a177cc2ce1faa09e5a5e3651c57d00af45ab5feb37fa00ac54ebcae6b21bdfe4b2dc110c841eec8
-
SSDEEP
768:uKsMqCXfVcW5/M9ZkiANIULYLDwUzc80gmq3oP/oDy:uKseNM9ZkiAPEr/0O8/oW
Static task
static1
Behavioral task
behavioral1
Sample
HEUR-Trojan-Ransom.Win32.Generic-6d7c489b15d82273b057d89b1a142d92caaf735b11b74ffb55348cb5e92d2bf6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
HEUR-Trojan-Ransom.Win32.Generic-6d7c489b15d82273b057d89b1a142d92caaf735b11b74ffb55348cb5e92d2bf6.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
HEUR-Trojan-Ransom.Win32.Generic-6d7c489b15d82273b057d89b1a142d92caaf735b11b74ffb55348cb5e92d2bf6.exe
-
Size
62KB
-
MD5
7e7111b32a1cee99edecd646ca1d5440
-
SHA1
7a10a266ad25572201ae4166cff7f1d67e8c9365
-
SHA256
6d7c489b15d82273b057d89b1a142d92caaf735b11b74ffb55348cb5e92d2bf6
-
SHA512
af94778652a77b918032f198cb917451b0c2fd9f91d1a9360a177cc2ce1faa09e5a5e3651c57d00af45ab5feb37fa00ac54ebcae6b21bdfe4b2dc110c841eec8
-
SSDEEP
768:uKsMqCXfVcW5/M9ZkiANIULYLDwUzc80gmq3oP/oDy:uKseNM9ZkiAPEr/0O8/oW
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-