General
-
Target
5bbd7a666d8c77df70eff22bda64822a364ae4001e461b3886ba20c95ecd80a2
-
Size
568KB
-
Sample
221118-zfx1zafh35
-
MD5
3769ceeb706d99e331d5db710c73a4f0
-
SHA1
44f09e999f1a5c5723983452e46017726f405d83
-
SHA256
5bbd7a666d8c77df70eff22bda64822a364ae4001e461b3886ba20c95ecd80a2
-
SHA512
6df88e5fc2b7967446bd349175e11eda8d9c79d0380f1464d945b7e7c0d405c8d4ecb5fd40aca56a5c6cffaf14fced9deab7e96053c26a956fb63bdaa725b009
-
SSDEEP
12288:zu2hTEEvhRrDjWcRq8DJ0Ja5yR1Sap0D484US5bJ:zvEEvvmCq8J0Ja5W1T/1Z
Static task
static1
Behavioral task
behavioral1
Sample
5bbd7a666d8c77df70eff22bda64822a364ae4001e461b3886ba20c95ecd80a2.exe
Resource
win7-20220812-en
Malware Config
Targets
-
-
Target
5bbd7a666d8c77df70eff22bda64822a364ae4001e461b3886ba20c95ecd80a2
-
Size
568KB
-
MD5
3769ceeb706d99e331d5db710c73a4f0
-
SHA1
44f09e999f1a5c5723983452e46017726f405d83
-
SHA256
5bbd7a666d8c77df70eff22bda64822a364ae4001e461b3886ba20c95ecd80a2
-
SHA512
6df88e5fc2b7967446bd349175e11eda8d9c79d0380f1464d945b7e7c0d405c8d4ecb5fd40aca56a5c6cffaf14fced9deab7e96053c26a956fb63bdaa725b009
-
SSDEEP
12288:zu2hTEEvhRrDjWcRq8DJ0Ja5yR1Sap0D484US5bJ:zvEEvvmCq8J0Ja5W1T/1Z
-
Modifies WinLogon for persistence
-
Modifies visibility of file extensions in Explorer
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Document created with cracked Office version
Office document contains Grizli777 string known to be caused by using a cracked version of the software.
-
Drops file in System32 directory
-