General
-
Target
f83fb9ce6a83da58b20685c1d7e1e546.zip.zip
-
Size
417KB
-
Sample
221231-s44p4ahg98
-
MD5
5f5e0c106041d9a391d1be6671dc82f3
-
SHA1
aa43e1ecc45a4ae28642235b9f1e891a78f54e65
-
SHA256
120ed7339a50b5d82ffa35bb5abf29d73957cdbfa99af83721533f5f8c238bf7
-
SHA512
4e3b61b8830d03a1b1562c251ed498ef64d9d014cf8a30d8ef6b469d81f4eaa72a095edb02f165ca7462d62c4cbfa70129169df59fedf6ce825d1fef7c45d607
-
SSDEEP
6144:Rc6PYa7JJKz3zZi8qAFEa4KCJl8LNci8IeAxWidb85XF0MCVphibcC2bzt9CcaNs:u6Lk3dFEdj8YzcbOQplC2ftZ+HM
Static task
static1
Behavioral task
behavioral1
Sample
e8a091a84dd2ea7ee429135ff48e9f48f7787637ccb79f6c3eb42f34588bc684.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e8a091a84dd2ea7ee429135ff48e9f48f7787637ccb79f6c3eb42f34588bc684.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
C:\DECRYPT-FILES.html
Extracted
C:\Users\Public\Desktop\DECRYPT-FILES.html
Extracted
C:\DECRYPT-FILES.html
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\DECRYPT-FILES.html
Targets
-
-
Target
e8a091a84dd2ea7ee429135ff48e9f48f7787637ccb79f6c3eb42f34588bc684.exe
-
Size
473KB
-
MD5
f83fb9ce6a83da58b20685c1d7e1e546
-
SHA1
01c459b549c1c2a68208d38d4ba5e36d29212a4f
-
SHA256
e8a091a84dd2ea7ee429135ff48e9f48f7787637ccb79f6c3eb42f34588bc684
-
SHA512
934ec9073a28b90e8df785bef49f224789da59f83729208b92dba0503e2894b3f48ed04b20de1ba49374b1cd26f0c87e8e5ab79e817258135e3be2c171f3f396
-
SSDEEP
12288:v6l/7FpnaeoQbRLBYdunMCayql4YcQD+AgJbAWgjbgpQ:CDna43YAKl4Yci+AggEpQ
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops startup file
-
Adds Run key to start application
-
Sets desktop wallpaper using registry
-