General
-
Target
319fbb2dd26045a90a452eb26799c6529f8a77ad8d7b967aec58111e25b12cd5.exe
-
Size
12KB
-
Sample
221227-jmh8dsee34
-
MD5
0a5e38ff165e9e78e58fd5b47b19b86a
-
SHA1
d0cccb38776b7390bf8b0fc5ebe14a75b1dfa3ef
-
SHA256
319fbb2dd26045a90a452eb26799c6529f8a77ad8d7b967aec58111e25b12cd5
-
SHA512
330c946e02bab30f4f33a6b246c0ad3d83438dddd1572d499aca2af5a1789714b81ba08729c2917ad8b6090ccb2b476d3a88f6bfd537ebd5a2f0e8ff9048ab67
-
SSDEEP
192:K/TrG62a6B10k3g4fXk1iTV3HGc7EkpAqEjvu2q9C/YpXnAITZfPtRMTrE4l2W:KebFNw4Pk1itKkpAjjI2YpdmToQ2W
Behavioral task
behavioral1
Sample
319fbb2dd26045a90a452eb26799c6529f8a77ad8d7b967aec58111e25b12cd5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
319fbb2dd26045a90a452eb26799c6529f8a77ad8d7b967aec58111e25b12cd5.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-3406023954-474543476-3319432036-1000\HOW TO DECRYPT FILES.txt
37t6hwuzJbq6PtEgaxyS3AWyLS99qMGrt8
Targets
-
-
Target
319fbb2dd26045a90a452eb26799c6529f8a77ad8d7b967aec58111e25b12cd5.exe
-
Size
12KB
-
MD5
0a5e38ff165e9e78e58fd5b47b19b86a
-
SHA1
d0cccb38776b7390bf8b0fc5ebe14a75b1dfa3ef
-
SHA256
319fbb2dd26045a90a452eb26799c6529f8a77ad8d7b967aec58111e25b12cd5
-
SHA512
330c946e02bab30f4f33a6b246c0ad3d83438dddd1572d499aca2af5a1789714b81ba08729c2917ad8b6090ccb2b476d3a88f6bfd537ebd5a2f0e8ff9048ab67
-
SSDEEP
192:K/TrG62a6B10k3g4fXk1iTV3HGc7EkpAqEjvu2q9C/YpXnAITZfPtRMTrE4l2W:KebFNw4Pk1itKkpAjjI2YpdmToQ2W
Score10/10-
Drops file in Drivers directory
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops startup file
-
Adds Run key to start application
-
Drops file in System32 directory
-