General
-
Target
369398deff9e11a852c3fd414b6288c380b554ccfee1aa16f8e23c8db8f760b4
-
Size
642KB
-
Sample
221126-kyaaasff33
-
MD5
a9d1f6ab9f83e46f0a3c6b1d2b8cafd2
-
SHA1
a1204f18c910fff65daa7f43d31a3fef5f2910d1
-
SHA256
369398deff9e11a852c3fd414b6288c380b554ccfee1aa16f8e23c8db8f760b4
-
SHA512
2dc3b0449a66baff43b1f3b1fe94f9b71deb9b6eaf98b34b5d8fa44ddbe952cfa264de5eea96899f2d2bc6e46bb491042f8244c86ddfc2bc6f65ae053885b981
-
SSDEEP
12288:vJOVDKwcJrtkw74Iv5Qb40r2EmT806Vb7KQnOlY0UOFeRIn:vYVDJorqwEIBQsRoBNKysY0/MRIn
Static task
static1
Behavioral task
behavioral1
Sample
369398deff9e11a852c3fd414b6288c380b554ccfee1aa16f8e23c8db8f760b4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
369398deff9e11a852c3fd414b6288c380b554ccfee1aa16f8e23c8db8f760b4.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\Decrypt All Files ssnfhdd.txt
http://uwm2wosrob3gplxy.onion.cab
http://uwm2wosrob3gplxy.tor2web.org
http://uwm2wosrob3gplxy.onion/
Extracted
C:\Users\Admin\Documents\Decrypt All Files ssnfhdd.txt
http://uwm2wosrob3gplxy.onion.cab
http://uwm2wosrob3gplxy.tor2web.org
http://uwm2wosrob3gplxy.onion/
Targets
-
-
Target
369398deff9e11a852c3fd414b6288c380b554ccfee1aa16f8e23c8db8f760b4
-
Size
642KB
-
MD5
a9d1f6ab9f83e46f0a3c6b1d2b8cafd2
-
SHA1
a1204f18c910fff65daa7f43d31a3fef5f2910d1
-
SHA256
369398deff9e11a852c3fd414b6288c380b554ccfee1aa16f8e23c8db8f760b4
-
SHA512
2dc3b0449a66baff43b1f3b1fe94f9b71deb9b6eaf98b34b5d8fa44ddbe952cfa264de5eea96899f2d2bc6e46bb491042f8244c86ddfc2bc6f65ae053885b981
-
SSDEEP
12288:vJOVDKwcJrtkw74Iv5Qb40r2EmT806Vb7KQnOlY0UOFeRIn:vYVDJorqwEIBQsRoBNKysY0/MRIn
Score10/10-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops desktop.ini file(s)
-
Sets desktop wallpaper using registry
-