General
-
Target
vss.exe
-
Size
225KB
-
Sample
221204-tdgcjsgh6y
-
MD5
07f5fbcb96179acffab2638392d08fb8
-
SHA1
22d84ca8e620ef5fc0027b3e06876d1a04d10406
-
SHA256
4f92e2f752e4b0b30193d53375cd2fbd4beff02db9d6b3b6cadbf3b50e503498
-
SHA512
0ed902259cf218f0d1f6349ff4ee45b674f19f867cbbe7fee28cf80b7edf67e691738274df4b2c7be01aac60639c45e35717e2b9c59518bc6e1240a022acabf4
-
SSDEEP
6144:FQJmXLQwAhWUkJ0kfV50DEr2MxgTw7ozFD254W:FeeLQwAi07DWGcopfW
Behavioral task
behavioral1
Sample
vss.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
vss.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
C:\README.html
us:<br><strong><br>email:[email protected]<br>email:[email protected]<br></strong><br><br>0KMJAig7xv8l6k+Y8szwZzvA5ecU9ObeLEkRQtp1gig6H1tIQzWu4dvQEGeagNn7
Extracted
C:\Users\Admin\AppData\Local\Temp\9986146891972527219.hta
Targets
-
-
Target
vss.exe
-
Size
225KB
-
MD5
07f5fbcb96179acffab2638392d08fb8
-
SHA1
22d84ca8e620ef5fc0027b3e06876d1a04d10406
-
SHA256
4f92e2f752e4b0b30193d53375cd2fbd4beff02db9d6b3b6cadbf3b50e503498
-
SHA512
0ed902259cf218f0d1f6349ff4ee45b674f19f867cbbe7fee28cf80b7edf67e691738274df4b2c7be01aac60639c45e35717e2b9c59518bc6e1240a022acabf4
-
SSDEEP
6144:FQJmXLQwAhWUkJ0kfV50DEr2MxgTw7ozFD254W:FeeLQwAi07DWGcopfW
Score10/10-
Venus Ransomware
-
Modifies boot configuration data using bcdedit
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-