General
-
Target
b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a
-
Size
815KB
-
Sample
221128-tvpegscc9x
-
MD5
51ed7e8e341c08280b7a0217f7c39a3f
-
SHA1
079ad2df4a1db02c4170b7d44aaa189f16194fa1
-
SHA256
b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a
-
SHA512
13c810699ca58e17a8a5e2bf36e3eeb5d404d5f740ae833fc06f3bcef3aa3cb01da6d373be07a32e29cc613c09803132b8b1a28928a2ffd35abc60b1918168be
-
SSDEEP
24576:coZle5i/xmrxgxh6UAkNe7bBmGC5MN8XL:dg9yG4Gen
Static task
static1
Behavioral task
behavioral1
Sample
b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
C:\Users\Admin\Documents\!Decrypt-All-Files-brkqcsi.txt
http://onja764ig6vah2jo.onion.cab
http://onja764ig6vah2jo.tor2web.org
http://onja764ig6vah2jo.onion/
Extracted
C:\ProgramData\yrnkowk.html
http://onja764ig6vah2jo.onion.cab
http://onja764ig6vah2jo.tor2web.org
http://onja764ig6vah2jo.onion
Targets
-
-
Target
b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a
-
Size
815KB
-
MD5
51ed7e8e341c08280b7a0217f7c39a3f
-
SHA1
079ad2df4a1db02c4170b7d44aaa189f16194fa1
-
SHA256
b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a
-
SHA512
13c810699ca58e17a8a5e2bf36e3eeb5d404d5f740ae833fc06f3bcef3aa3cb01da6d373be07a32e29cc613c09803132b8b1a28928a2ffd35abc60b1918168be
-
SSDEEP
24576:coZle5i/xmrxgxh6UAkNe7bBmGC5MN8XL:dg9yG4Gen
Score10/10-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-