General
-
Target
8e974a3be94b7748f7971f278160a74d738d5cab2c3088b1492cfbbd05e83e22.exe
-
Size
159KB
-
Sample
221009-lhpkqaghcn
-
MD5
ecc918fd6e040ba4675c3179f05da459
-
SHA1
b372124021c93ffc52e43a7af0883e880d4eb730
-
SHA256
8e974a3be94b7748f7971f278160a74d738d5cab2c3088b1492cfbbd05e83e22
-
SHA512
840b668cbad5897b5f52fe4ef86069b6668f49299a5b2bba24290d7df7b7db36f8ef4ee89644134d61930da647a235b38af2ebe79e772c547a8ba5b05ba08cad
-
SSDEEP
3072:X3ypcDozZR/WcCF7dPiyJUh5KvdtEZtPz4g0I/t9L05Uht9uew+BVfRUi6BJ+L:X3ypcmR/UoyJU8EPPE0tVPtnNgg
Behavioral task
behavioral1
Sample
8e974a3be94b7748f7971f278160a74d738d5cab2c3088b1492cfbbd05e83e22.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-929662420-1054238289-2961194603-1000\RECOVERY FILES.txt
https://t.me/mallox_leaks
Targets
-
-
Target
8e974a3be94b7748f7971f278160a74d738d5cab2c3088b1492cfbbd05e83e22.exe
-
Size
159KB
-
MD5
ecc918fd6e040ba4675c3179f05da459
-
SHA1
b372124021c93ffc52e43a7af0883e880d4eb730
-
SHA256
8e974a3be94b7748f7971f278160a74d738d5cab2c3088b1492cfbbd05e83e22
-
SHA512
840b668cbad5897b5f52fe4ef86069b6668f49299a5b2bba24290d7df7b7db36f8ef4ee89644134d61930da647a235b38af2ebe79e772c547a8ba5b05ba08cad
-
SSDEEP
3072:X3ypcDozZR/WcCF7dPiyJUh5KvdtEZtPz4g0I/t9L05Uht9uew+BVfRUi6BJ+L:X3ypcmR/UoyJU8EPPE0tVPtnNgg
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-