General
-
Target
5fe4e659c4bd91aec2a126c8f74b01b37d6ffc6701657c93d193decfe19834d0
-
Size
178KB
-
Sample
221126-kyawtsaf21
-
MD5
eef171f1c62bcec4835b8f806a772766
-
SHA1
5e2f0fc5300f3d394e00abbc34f687215ba87bb6
-
SHA256
5fe4e659c4bd91aec2a126c8f74b01b37d6ffc6701657c93d193decfe19834d0
-
SHA512
89a02b361c3ec6ea25838a586b15420309629703b66236d9d62c007e8d7310369e59480b06b397b062c9021070f811be9ce59161a97e77cc324b505b81c01eb5
-
SSDEEP
3072:cykTeZnw9fFzwDvmotqMn7DZr3R90JS7X3/uleQGSCYnh1PfwFqWPEf3Eiy:cykTpFMXtq+DZrzYSz2jGPYh1AFqWDl
Static task
static1
Behavioral task
behavioral1
Sample
report-order-tracking-genereted-auto-gls.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
report-order-tracking-genereted-auto-gls.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\!Decrypt-All-Files-nntdmzk.txt
http://pf5dahldauhrjxfd.onion.cab
http://pf5dahldauhrjxfd.tor2web.org
http://pf5dahldauhrjxfd.onion/
Targets
-
-
Target
report-order-tracking-genereted-auto-gls.exe
-
Size
248KB
-
MD5
d8704f06cb0813c2cbb543b95fda51ce
-
SHA1
987886e485ecf443002159065411e42cb0dfc264
-
SHA256
39202dbfb206cb19ae76895199276a0e51ed7b66adf3d3c50da86926bb2f7b40
-
SHA512
473b859bb0a9c2a5837891aba52ab546f07b5db97f15f2ed44944413f151a2fac9116fd1fb17e02b198e63b835948c75a31abbb9982bb201f0999707550d9cc8
-
SSDEEP
3072:nhFldQnaongiDIhFxbQO48QmcjVDLAAbwwNL768P2NU+dNWz+78/H6OUdDGBLgvC:NbQFZ1ZnzFFPyc+A/etYXg0kZO0Cm
Score10/10-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Suspicious use of SetThreadContext
-