General
-
Target
409e2d09f3675bd1d2cdac3bb003f78d.exe
-
Size
847KB
-
Sample
221201-q5v38sdg55
-
MD5
409e2d09f3675bd1d2cdac3bb003f78d
-
SHA1
588b45567e8e4846c90b7a5d3c5b3d80cfc80426
-
SHA256
bdbba6afa1fe6a41d85a712ddb48c6fb9057df42cc9e318ea582d5535008025c
-
SHA512
74a9cfd8bfa55bb2d92bbbdbc7b3783a781682895a05035872b54421a5e135a9ce23dc046cb5d2b1810321043c8da43480fefcbad6583a1c2f0900c1d33f05d4
-
SSDEEP
12288:rFvtbfQjL9QzX7BIBi8pV4VpQWsNTA95WsYB9TF1Nfc1NfpHsVfdc:hFbIjJQ5B8pnzTqY7/NcO
Static task
static1
Behavioral task
behavioral1
Sample
409e2d09f3675bd1d2cdac3bb003f78d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
409e2d09f3675bd1d2cdac3bb003f78d.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
C:\readme.txt
http://obzuqvr5424kkc4unbq2p2i67ny3zngce3tbdr37nicjqesgqcgomfqd.onion/?ST2GHJLMOPR
https://yip.su/2QstD5
Extracted
C:\readme.txt
http://obzuqvr5424kkc4unbq2p2i67ny3zngce3tbdr37nicjqesgqcgomfqd.onion/?ST2GHJLMOPR
https://yip.su/2QstD5
Targets
-
-
Target
409e2d09f3675bd1d2cdac3bb003f78d.exe
-
Size
847KB
-
MD5
409e2d09f3675bd1d2cdac3bb003f78d
-
SHA1
588b45567e8e4846c90b7a5d3c5b3d80cfc80426
-
SHA256
bdbba6afa1fe6a41d85a712ddb48c6fb9057df42cc9e318ea582d5535008025c
-
SHA512
74a9cfd8bfa55bb2d92bbbdbc7b3783a781682895a05035872b54421a5e135a9ce23dc046cb5d2b1810321043c8da43480fefcbad6583a1c2f0900c1d33f05d4
-
SSDEEP
12288:rFvtbfQjL9QzX7BIBi8pV4VpQWsNTA95WsYB9TF1Nfc1NfpHsVfdc:hFbIjJQ5B8pnzTqY7/NcO
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-