Resubmissions
03/05/2023, 06:56
230503-hqll9adh35 1002/05/2023, 10:00
230502-l1wfzsae76 1028/01/2023, 20:32
230128-zbct8sgc59 1028/01/2023, 20:31
230128-za2rzahf8x 323/01/2023, 21:24
230123-z9hhdafe87 1023/01/2023, 21:19
230123-z6jw2afe75 1023/01/2023, 21:08
230123-zy4apsfe37 1023/01/2023, 20:56
230123-zrhenafd86 1023/01/2023, 16:41
230123-t7eqtafg6t 1023/01/2023, 16:29
230123-tzremseb62 10General
-
Target
lawsuit.zip
-
Size
8.5MB
-
Sample
230123-zy4apsfe37
-
MD5
01ccead2e9497ce04ab0c2531320224d
-
SHA1
9b7ebc4d8f97b0e7463a382f3b748a4be48a06a1
-
SHA256
c898a07ac3e02231a48bf55bd8828d4c77c7ea3c5cfe80e9eec44c81cb476cbb
-
SHA512
25a07ce5f211dfef00939eb61084675991b72d859ddd39db0d1e5af591811675cec30cc9a6ce397ad2d2abbcc60faff02e556bf8ff6c86045b8d23e6843c04cb
-
SSDEEP
98304:w9D8TiRYDS2JAVvOhwGw7Kn7iL/ji7BmdAMdT+a3bRQXR5s6PX2STjwmZ0nZSmAL:M+K2JgmwwOL7cLy+aW5puAjgtp5YVr
Behavioral task
behavioral1
Sample
lawsuit.zip
Resource
win10v2004-20220901-en
Malware Config
Extracted
C:\odt\Restore-My-Files.txt
lockbit
http://lockbit-decryptor.top/?85C01E35FD24495C8D4BE000C8177E65
http://lockbitks2tvnmwk.onion/?85C01E35FD24495C8D4BE000C8177E65
Targets
-
-
Target
lawsuit.zip
-
Size
8.5MB
-
MD5
01ccead2e9497ce04ab0c2531320224d
-
SHA1
9b7ebc4d8f97b0e7463a382f3b748a4be48a06a1
-
SHA256
c898a07ac3e02231a48bf55bd8828d4c77c7ea3c5cfe80e9eec44c81cb476cbb
-
SHA512
25a07ce5f211dfef00939eb61084675991b72d859ddd39db0d1e5af591811675cec30cc9a6ce397ad2d2abbcc60faff02e556bf8ff6c86045b8d23e6843c04cb
-
SSDEEP
98304:w9D8TiRYDS2JAVvOhwGw7Kn7iL/ji7BmdAMdT+a3bRQXR5s6PX2STjwmZ0nZSmAL:M+K2JgmwwOL7cLy+aW5puAjgtp5YVr
-
Modifies boot configuration data using bcdedit
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-