General
-
Target
5c6f911f0919dcb1739510e629016304ecc9908cfd6d1c27ac7c0b0710b650f7.zip
-
Size
972KB
-
Sample
221103-3emqdsgff8
-
MD5
cc2bd1e896fe8dc1a0116527d6f00b43
-
SHA1
3be26ba3ef9b854062acfdc603d068755863282f
-
SHA256
e12ef4d9f819524735df8ac1c66e84bbc2c0499247c0fa9d40e344fee4f19334
-
SHA512
536f87f3def1429b5de5d308e08c92ba538f6b28884c622e2709796da388597ad6d3c1ee496f88c0d04c224ba0356f423a8f317bed34929ea60edebd6b143a3c
-
SSDEEP
24576:ERKJg2qFbatJoMfSM/vbw8Ok3i1+q/VxnPftFbwZ5tej0+Q44ED:ERKJgNAtJoj+bMk3iEq/zntF06PmED
Static task
static1
Behavioral task
behavioral1
Sample
5c6f911f0919dcb1739510e629016304ecc9908cfd6d1c27ac7c0b0710b650f7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5c6f911f0919dcb1739510e629016304ecc9908cfd6d1c27ac7c0b0710b650f7.exe
Resource
win10-20220812-en
Behavioral task
behavioral3
Sample
5c6f911f0919dcb1739510e629016304ecc9908cfd6d1c27ac7c0b0710b650f7.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
C:\README1.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README2.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README3.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README4.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README5.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README6.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README7.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README8.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README9.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README10.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Targets
-
-
Target
5c6f911f0919dcb1739510e629016304ecc9908cfd6d1c27ac7c0b0710b650f7
-
Size
1.1MB
-
MD5
5d5d9dba99e609b34ea040ef7003e444
-
SHA1
c33169d65768a0b46d50501f3cf7dd948e8f704d
-
SHA256
5c6f911f0919dcb1739510e629016304ecc9908cfd6d1c27ac7c0b0710b650f7
-
SHA512
e833e2f66325e19ea988d96949311fa6c69cce62c40456523b96fb3e61552a59bd1b6deffeba9df59334c5530079d6277e2ae1a6394b84f6ff8baf0463690e40
-
SSDEEP
24576:PrQQEB+ekoKYkrB43qLpM7diN+glAp3R6HTBzDvc:DQQSL1KYO43qLpMkN+MS3YzDvc
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-