General
-
Target
d0003c88c3a7786f3642ec903ce98f4027badaba69b7c3bb2e90a6e4e9587f54
-
Size
2.3MB
-
Sample
221020-j5pswsdca5
-
MD5
2fa3c5b2e6a0c465045fe8dd7f55dd9a
-
SHA1
1e6ea91491804da44db10be25bd1ea36baa0b362
-
SHA256
d0003c88c3a7786f3642ec903ce98f4027badaba69b7c3bb2e90a6e4e9587f54
-
SHA512
12f2aaa7cf2055d0a15470d926690dc558d5b6a1eb7dd9f1e450ddbdd1c5389670aea7c39e800f86840f0a558b86ba023beb82d6ba66557a1882e6491b1865e1
-
SSDEEP
49152:zwKNchAjMta5q1SRNyYvgkCzS8QpWRjoYS8KXrTBt6z8zQBmL2eC8AE:MKtjMoq0IG8QpWRjZaPEFnem
Behavioral task
behavioral1
Sample
d0003c88c3a7786f3642ec903ce98f4027badaba69b7c3bb2e90a6e4e9587f54.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d0003c88c3a7786f3642ec903ce98f4027badaba69b7c3bb2e90a6e4e9587f54.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\HOW TO RESTORE YOUR FILES.TXT
Targets
-
-
Target
d0003c88c3a7786f3642ec903ce98f4027badaba69b7c3bb2e90a6e4e9587f54
-
Size
2.3MB
-
MD5
2fa3c5b2e6a0c465045fe8dd7f55dd9a
-
SHA1
1e6ea91491804da44db10be25bd1ea36baa0b362
-
SHA256
d0003c88c3a7786f3642ec903ce98f4027badaba69b7c3bb2e90a6e4e9587f54
-
SHA512
12f2aaa7cf2055d0a15470d926690dc558d5b6a1eb7dd9f1e450ddbdd1c5389670aea7c39e800f86840f0a558b86ba023beb82d6ba66557a1882e6491b1865e1
-
SSDEEP
49152:zwKNchAjMta5q1SRNyYvgkCzS8QpWRjoYS8KXrTBt6z8zQBmL2eC8AE:MKtjMoq0IG8QpWRjZaPEFnem
Score10/10-
Detecting the common Go functions and variables names used by Snatch ransomware
-
Snatch Ransomware
Ransomware family generally distributed through RDP bruteforce attacks.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops startup file
-