General
-
Target
0a1688dd2444cbec7c67fae7d0d2745d4b9282e7788623df64b5507f1f7f1b41
-
Size
388KB
-
Sample
221003-b15dsacdel
-
MD5
678e01aacc99779c502e9473876548e0
-
SHA1
cd9e404b37a2029e88f904b98f966b7e1284ff70
-
SHA256
0a1688dd2444cbec7c67fae7d0d2745d4b9282e7788623df64b5507f1f7f1b41
-
SHA512
9e37f00ca44f966e3b5c47cd0cdf09cbd960ef961baca64b7fce9a70882e54151c5ddb5d755aef3bf1e3a16a804d90cc4398362440b64ee034a7a1e470b151c4
-
SSDEEP
6144:fda8uOhcMWhqVln4xKDW9KobFEFLOSO6/NvsHJxc00d+DzRLITiNs:Va8ivhqVl+KC9LpEQSO62DzRLm
Static task
static1
Behavioral task
behavioral1
Sample
0a1688dd2444cbec7c67fae7d0d2745d4b9282e7788623df64b5507f1f7f1b41.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0a1688dd2444cbec7c67fae7d0d2745d4b9282e7788623df64b5507f1f7f1b41.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-3845472200-3839195424-595303356-1000\HELP_RESTORE_FILES.txt
15fVgKDf3MmS6FzNzRztWWzMcWPXatpVgP
http://tkj3higtqlvohs7z.aw49f4j3n26.com
http://tkj3higtqlvohs7z.dfj3d8w3n27.com
https://tkj3higtqlvohs7z.s5.tor-gateways.de/
http://tkj3higtqlvohs7z.onion/
Extracted
C:\$Recycle.Bin\S-1-5-21-929662420-1054238289-2961194603-1000\HELP_RESTORE_FILES.txt
13cDQ5mkTSBazoP4mGFU4SSzZN3LEusayg
http://tkj3higtqlvohs7z.aw49f4j3n26.com
http://tkj3higtqlvohs7z.dfj3d8w3n27.com
https://tkj3higtqlvohs7z.s5.tor-gateways.de/
http://tkj3higtqlvohs7z.onion/
Targets
-
-
Target
0a1688dd2444cbec7c67fae7d0d2745d4b9282e7788623df64b5507f1f7f1b41
-
Size
388KB
-
MD5
678e01aacc99779c502e9473876548e0
-
SHA1
cd9e404b37a2029e88f904b98f966b7e1284ff70
-
SHA256
0a1688dd2444cbec7c67fae7d0d2745d4b9282e7788623df64b5507f1f7f1b41
-
SHA512
9e37f00ca44f966e3b5c47cd0cdf09cbd960ef961baca64b7fce9a70882e54151c5ddb5d755aef3bf1e3a16a804d90cc4398362440b64ee034a7a1e470b151c4
-
SSDEEP
6144:fda8uOhcMWhqVln4xKDW9KobFEFLOSO6/NvsHJxc00d+DzRLITiNs:Va8ivhqVl+KC9LpEQSO62DzRLm
Score10/10-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-