General
-
Target
executable.exe
-
Size
59KB
-
Sample
220926-lvxrvsada9
-
MD5
e522012832258c2a249ec2d47ae6466b
-
SHA1
801b3409be244e0002c39a7ea1ae9dad983d57a8
-
SHA256
928b382e4ace76bdd1dd260ae5c8b832d724e07ae72ff665406ac2e599aff3e3
-
SHA512
33737b79a7f8989c7999dea94d2c5fb03f3c8fc91b94b1cbced391cf1db3c8ea1321f7b21391f711b4ef36bb6a46c92f0036f524b336fb791e903265af0704df
-
SSDEEP
1536:NNeRBl5PT/rx1mzwRMSTdLpJcBSW1kXWFe8:NQRrmzwR5JISW1kX
Static task
static1
Behavioral task
behavioral1
Sample
executable.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
executable.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
C:\Users\Admin\Desktop\info.hta
https://t.me/Files_decrypt
https://icq.com/windows/
https://icq.im/Ransomware_Decrypt/
https://getsession.org
https://tox.chat/download.html
Extracted
C:\info.hta
https://t.me/Files_decrypt
https://icq.com/windows/
https://icq.im/Ransomware_Decrypt/
https://getsession.org
https://tox.chat/download.html
Targets
-
-
Target
executable.exe
-
Size
59KB
-
MD5
e522012832258c2a249ec2d47ae6466b
-
SHA1
801b3409be244e0002c39a7ea1ae9dad983d57a8
-
SHA256
928b382e4ace76bdd1dd260ae5c8b832d724e07ae72ff665406ac2e599aff3e3
-
SHA512
33737b79a7f8989c7999dea94d2c5fb03f3c8fc91b94b1cbced391cf1db3c8ea1321f7b21391f711b4ef36bb6a46c92f0036f524b336fb791e903265af0704df
-
SSDEEP
1536:NNeRBl5PT/rx1mzwRMSTdLpJcBSW1kXWFe8:NQRrmzwR5JISW1kX
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies boot configuration data using bcdedit
-
Modifies Windows Firewall
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-