General
-
Target
1.exe
-
Size
214KB
-
Sample
220926-vpczyacehj
-
MD5
1175cee6112669df046466d218109fb5
-
SHA1
25569cd2d388f1e08ee14afd982b236d45d24b76
-
SHA256
89553444e2b621c1894b6b14023db472f28120ee311adbca8618eaa0106837eb
-
SHA512
c23c8c9025f1267e55b20c0f42103b556e9323d3e42a1a7f3ad1810565da43f55ca7a96c1cad0740462436c62f1b8392eee1ae90aa9657f3d88aafb27ac75175
-
SSDEEP
6144:myJE1yd7WHJmcyfjtPWna4DQFu/U3buRKlemZ9DnGAevIhdiFy+:mU/d7WsvBPWa4DQFu/U3buRKlemZ9Dn4
Behavioral task
behavioral1
Sample
1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
https://tox.chat/download.html
Extracted
C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
https://tox.chat/download.html
Targets
-
-
Target
1.exe
-
Size
214KB
-
MD5
1175cee6112669df046466d218109fb5
-
SHA1
25569cd2d388f1e08ee14afd982b236d45d24b76
-
SHA256
89553444e2b621c1894b6b14023db472f28120ee311adbca8618eaa0106837eb
-
SHA512
c23c8c9025f1267e55b20c0f42103b556e9323d3e42a1a7f3ad1810565da43f55ca7a96c1cad0740462436c62f1b8392eee1ae90aa9657f3d88aafb27ac75175
-
SSDEEP
6144:myJE1yd7WHJmcyfjtPWna4DQFu/U3buRKlemZ9DnGAevIhdiFy+:mU/d7WsvBPWa4DQFu/U3buRKlemZ9Dn4
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Deletes itself
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-