General
-
Target
8e974a3be94b7748f7971f278160a74d738d5cab2c3088b1492cfbbd05e83e22.zip
-
Size
88KB
-
Sample
221009-vex75ahdfq
-
MD5
87b7f560df2bebd79b95ffd9f093ec6e
-
SHA1
b7bcca9a12bb1fe6e3a595d9c76555a18c8331bc
-
SHA256
40333778efd4cdde89fe2c4adc1066f418421e0ea26abdfcc4a5ce3e79436b27
-
SHA512
753e3dd5d47cd56126dfe96ed13cf970f88c5994d525a6f0bf3ab41ee35732af740c2f41c095a5e210d71cd3c7ed40f5ca8ca8e0d8245e102032557608728aaf
-
SSDEEP
1536:7UeA6hcU7m3ja9g2xAUsB2vI52/O67cHTPCrLzwIzRkLJc9lAXOtCAerEQN:7Ue/hT2a9g2xAHz4OnTPWHw+udc9lAHJ
Behavioral task
behavioral1
Sample
8e974a3be94b7748f7971f278160a74d738d5cab2c3088b1492cfbbd05e83e22.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8e974a3be94b7748f7971f278160a74d738d5cab2c3088b1492cfbbd05e83e22.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-999675638-2867687379-27515722-1000\RECOVERY FILES.txt
https://t.me/mallox_leaks
Targets
-
-
Target
8e974a3be94b7748f7971f278160a74d738d5cab2c3088b1492cfbbd05e83e22
-
Size
159KB
-
MD5
ecc918fd6e040ba4675c3179f05da459
-
SHA1
b372124021c93ffc52e43a7af0883e880d4eb730
-
SHA256
8e974a3be94b7748f7971f278160a74d738d5cab2c3088b1492cfbbd05e83e22
-
SHA512
840b668cbad5897b5f52fe4ef86069b6668f49299a5b2bba24290d7df7b7db36f8ef4ee89644134d61930da647a235b38af2ebe79e772c547a8ba5b05ba08cad
-
SSDEEP
3072:X3ypcDozZR/WcCF7dPiyJUh5KvdtEZtPz4g0I/t9L05Uht9uew+BVfRUi6BJ+L:X3ypcmR/UoyJU8EPPE0tVPtnNgg
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-