General
-
Target
cf3bdf0f8ea4c8ece5f5a76524ab4c81fea6c3a1715b5a86b3ad4d397fca76f3
-
Size
875KB
-
Sample
221207-m5r5ssaf82
-
MD5
f1dd01a9e4b959e569250354d74e0423
-
SHA1
7e2e524fd33261449571f1334868b17ef46e550d
-
SHA256
cf3bdf0f8ea4c8ece5f5a76524ab4c81fea6c3a1715b5a86b3ad4d397fca76f3
-
SHA512
d878f63456abdc4a67abd0bd208faf1e77c6baf470f84afa345c6c013f519fc4cff10ae5b3cd700e5fabf11fee3c7e1b357d81e89f7c8c09ce9ef53c99d76202
-
SSDEEP
24576:B0cwn8nZ9FAQKlPntIQxbU5Wj1Lj8EAUbv170CrKwoUY:I8Z9FxaPuQxbUu1LjUUR7mUY
Static task
static1
Behavioral task
behavioral1
Sample
cf3bdf0f8ea4c8ece5f5a76524ab4c81fea6c3a1715b5a86b3ad4d397fca76f3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cf3bdf0f8ea4c8ece5f5a76524ab4c81fea6c3a1715b5a86b3ad4d397fca76f3.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
C:\How To Restore Your Files.txt
Targets
-
-
Target
cf3bdf0f8ea4c8ece5f5a76524ab4c81fea6c3a1715b5a86b3ad4d397fca76f3
-
Size
875KB
-
MD5
f1dd01a9e4b959e569250354d74e0423
-
SHA1
7e2e524fd33261449571f1334868b17ef46e550d
-
SHA256
cf3bdf0f8ea4c8ece5f5a76524ab4c81fea6c3a1715b5a86b3ad4d397fca76f3
-
SHA512
d878f63456abdc4a67abd0bd208faf1e77c6baf470f84afa345c6c013f519fc4cff10ae5b3cd700e5fabf11fee3c7e1b357d81e89f7c8c09ce9ef53c99d76202
-
SSDEEP
24576:B0cwn8nZ9FAQKlPntIQxbU5Wj1Lj8EAUbv170CrKwoUY:I8Z9FxaPuQxbUu1LjUUR7mUY
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-