General
-
Target
11090879de7060d1ffa3188e78af8a8e710488a9b9a1f67e147a39c218783b61
-
Size
762KB
-
Sample
221124-ex4jvsca2w
-
MD5
00e90026198266ac834b0dbcd9c4f838
-
SHA1
803603c0610b6e726edb201cb1fef3ad472a9afe
-
SHA256
11090879de7060d1ffa3188e78af8a8e710488a9b9a1f67e147a39c218783b61
-
SHA512
2ae4c9d4fd55215fffe592daf3770c5c91e9c7970748a575226f9ee7d6c9e760a95a74509f53cf8986988454741297ece90b9a33f8f74d37c6f974684fd2a2a9
-
SSDEEP
12288:aMmXLbRD6RGU2sTRL9JoCBGYLVvdq0xW1zoojZuKCPKSCOrPDQcciv9CUIyywCYp:tmXLbB6RG4TRXoCBGYLxxxW1soFurPK6
Static task
static1
Behavioral task
behavioral1
Sample
11090879de7060d1ffa3188e78af8a8e710488a9b9a1f67e147a39c218783b61.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
11090879de7060d1ffa3188e78af8a8e710488a9b9a1f67e147a39c218783b61.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DecryptAllFiles 7138621.txt
http://kurrmpfx6kgmsopm.onion
Extracted
C:\Users\Admin\Documents\zlwdkgg.html
http-equiv='Content-Type
Extracted
C:\Users\Admin\Documents\ystryfa.html
http-equiv='Content-Type
Extracted
C:\Users\Admin\Documents\DecryptAllFiles 240714250.txt
http://kurrmpfx6kgmsopm.onion
Targets
-
-
Target
11090879de7060d1ffa3188e78af8a8e710488a9b9a1f67e147a39c218783b61
-
Size
762KB
-
MD5
00e90026198266ac834b0dbcd9c4f838
-
SHA1
803603c0610b6e726edb201cb1fef3ad472a9afe
-
SHA256
11090879de7060d1ffa3188e78af8a8e710488a9b9a1f67e147a39c218783b61
-
SHA512
2ae4c9d4fd55215fffe592daf3770c5c91e9c7970748a575226f9ee7d6c9e760a95a74509f53cf8986988454741297ece90b9a33f8f74d37c6f974684fd2a2a9
-
SSDEEP
12288:aMmXLbRD6RGU2sTRL9JoCBGYLVvdq0xW1zoojZuKCPKSCOrPDQcciv9CUIyywCYp:tmXLbB6RG4TRXoCBGYLxxxW1soFurPK6
Score10/10-
Executes dropped EXE
-
Modifies Installed Components in the registry
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-