General
-
Target
78272eae2668169b0afb19168a71d103974da30d597a3f509ccf607c842fd361.exe
-
Size
265KB
-
Sample
221209-gbsatacd98
-
MD5
3ac0d935228460fdc38bdab692d71b0c
-
SHA1
d08f753af5b5d9be3352495189be6fd4914ad8e1
-
SHA256
78272eae2668169b0afb19168a71d103974da30d597a3f509ccf607c842fd361
-
SHA512
04376fc469808504a8071f0b9baa35c4f922d7b69c4d4c6e77309022f95cf916a80b758a6733154f36e8be59d928b93903eec47a6df32e96b2ef3b4b6f0fde54
-
SSDEEP
6144:k9Pj5XJkcXV50DErs5xgTw7ozFz254WfRgzJmXrQwAN:akzDZGcoxfWfRglerQwAN
Behavioral task
behavioral1
Sample
78272eae2668169b0afb19168a71d103974da30d597a3f509ccf607c842fd361.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
78272eae2668169b0afb19168a71d103974da30d597a3f509ccf607c842fd361.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
\??\E:\README.html
us:<br><strong><br>email:[email protected]<br>email:[email protected]<br></strong><br><br>WulaZ+g2Lncvvsm+OHlq3l8MSul2Lz7SBT6r9cBXVxYGhPvBNR5iLsZcjtYhJxnY
Targets
-
-
Target
78272eae2668169b0afb19168a71d103974da30d597a3f509ccf607c842fd361.exe
-
Size
265KB
-
MD5
3ac0d935228460fdc38bdab692d71b0c
-
SHA1
d08f753af5b5d9be3352495189be6fd4914ad8e1
-
SHA256
78272eae2668169b0afb19168a71d103974da30d597a3f509ccf607c842fd361
-
SHA512
04376fc469808504a8071f0b9baa35c4f922d7b69c4d4c6e77309022f95cf916a80b758a6733154f36e8be59d928b93903eec47a6df32e96b2ef3b4b6f0fde54
-
SSDEEP
6144:k9Pj5XJkcXV50DErs5xgTw7ozFz254WfRgzJmXrQwAN:akzDZGcoxfWfRglerQwAN
-
Detect Neshta payload
-
Modifies system executable filetype association
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Venus Ransomware
-
Modifies boot configuration data using bcdedit
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-