General
-
Target
de51ca8c619a690007fef423d20379d4e949997da159ec037d65bcc444bdf09b
-
Size
637KB
-
Sample
221126-nh81gabb76
-
MD5
17740a31da003de7d03e1a89ffa01b40
-
SHA1
1c7089eb6f37035a18cee7a7bda7fa83c85d18c1
-
SHA256
de51ca8c619a690007fef423d20379d4e949997da159ec037d65bcc444bdf09b
-
SHA512
41683bc9c98a5f2fdb75d815cb866a03166cf56d745d1876ebb1d4bfbabaa5df32ca3fdb6d291f793acc4266231688e5a9b9d4b18113a47f21ebb7f1b39c5d61
-
SSDEEP
12288:7Wbr5dYHRCfp7cJY2nj9pH9G3qMc7qJUHrlm63yCkhep9Mkkf:6bddfhIJN7dG3O7XH53ybheLDkf
Static task
static1
Behavioral task
behavioral1
Sample
de51ca8c619a690007fef423d20379d4e949997da159ec037d65bcc444bdf09b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
de51ca8c619a690007fef423d20379d4e949997da159ec037d65bcc444bdf09b.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\Decrypt All Files gbtcmzk.txt
http://uwm2wosrob3gplxy.onion.cab
http://uwm2wosrob3gplxy.tor2web.org
http://uwm2wosrob3gplxy.onion/
Extracted
C:\ProgramData\orxfdbk.html
http-equiv='Content-Type
Targets
-
-
Target
de51ca8c619a690007fef423d20379d4e949997da159ec037d65bcc444bdf09b
-
Size
637KB
-
MD5
17740a31da003de7d03e1a89ffa01b40
-
SHA1
1c7089eb6f37035a18cee7a7bda7fa83c85d18c1
-
SHA256
de51ca8c619a690007fef423d20379d4e949997da159ec037d65bcc444bdf09b
-
SHA512
41683bc9c98a5f2fdb75d815cb866a03166cf56d745d1876ebb1d4bfbabaa5df32ca3fdb6d291f793acc4266231688e5a9b9d4b18113a47f21ebb7f1b39c5d61
-
SSDEEP
12288:7Wbr5dYHRCfp7cJY2nj9pH9G3qMc7qJUHrlm63yCkhep9Mkkf:6bddfhIJN7dG3O7XH53ybheLDkf
Score10/10-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops desktop.ini file(s)
-