General
-
Target
a2931fbe8affc89239b30fef37cb3b567e7483c5d4494e0e459efae733ecee92
-
Size
1012KB
-
Sample
221125-x8drpaac34
-
MD5
d9687bcc9a27bcd0f13b9582edb06f67
-
SHA1
a74a952457d1bc2edb9d459852fe823615870f60
-
SHA256
a2931fbe8affc89239b30fef37cb3b567e7483c5d4494e0e459efae733ecee92
-
SHA512
c11ac848ed72aeaae76f345f0bbc2b6934c0cec0729279f59b5a6a14f5d3b2d1ff4d2322eae3a217231841aeb436e0817d50fe59aa8105791b4bbc13a1906769
-
SSDEEP
12288:b5r+zclYhHS4xovm4+l+9qzezjhGfqlmTlKb37NTXivuzV+2ZrPhnqyPqFjFMuMX:b1+E0SmUafqGlKj7NbivuM2ZrJCjN8
Static task
static1
Behavioral task
behavioral1
Sample
a2931fbe8affc89239b30fef37cb3b567e7483c5d4494e0e459efae733ecee92.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a2931fbe8affc89239b30fef37cb3b567e7483c5d4494e0e459efae733ecee92.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\!Decrypt-All-Files-ojkdmzk.txt
http://onja764ig6vah2jo.onion.cab
http://onja764ig6vah2jo.tor2web.org
http://onja764ig6vah2jo.onion/
Targets
-
-
Target
a2931fbe8affc89239b30fef37cb3b567e7483c5d4494e0e459efae733ecee92
-
Size
1012KB
-
MD5
d9687bcc9a27bcd0f13b9582edb06f67
-
SHA1
a74a952457d1bc2edb9d459852fe823615870f60
-
SHA256
a2931fbe8affc89239b30fef37cb3b567e7483c5d4494e0e459efae733ecee92
-
SHA512
c11ac848ed72aeaae76f345f0bbc2b6934c0cec0729279f59b5a6a14f5d3b2d1ff4d2322eae3a217231841aeb436e0817d50fe59aa8105791b4bbc13a1906769
-
SSDEEP
12288:b5r+zclYhHS4xovm4+l+9qzezjhGfqlmTlKb37NTXivuzV+2ZrPhnqyPqFjFMuMX:b1+E0SmUafqGlKj7NbivuM2ZrJCjN8
Score10/10-
Executes dropped EXE
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-