General
-
Target
307a61c288932ffeb7a25d667cf2911266c5379acfab20aa9a52c1aa1148d59b.bin.sample
-
Size
14KB
-
Sample
230124-zt3tdafd8x
-
MD5
4a42f739ce694db7b3cdd3c233ce7fb1
-
SHA1
68fcc99e719b57308c9b1b3d4eef91dec62d02e5
-
SHA256
307a61c288932ffeb7a25d667cf2911266c5379acfab20aa9a52c1aa1148d59b
-
SHA512
15137fdc43519be2e83346d7a07c84d439e4da22e328722cb3da6bf1bcfbf584b2594901582ddf6ea363ae515e37cb1f32c407a8ebfe747a13562de927f92f54
-
SSDEEP
384:0prr1gkDCgSZ75pbB7E68AvXIHqe939g83FMENKsB:arVDCp/h8QIOwiO
Behavioral task
behavioral1
Sample
307a61c288932ffeb7a25d667cf2911266c5379acfab20aa9a52c1aa1148d59b.bin.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
307a61c288932ffeb7a25d667cf2911266c5379acfab20aa9a52c1aa1148d59b.bin.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-3845472200-3839195424-595303356-1000\HOW TO DECRYPT FILES.txt
1NJNG57hFPPcmSmFYbxKmL33uc5nLwYLCK
Targets
-
-
Target
307a61c288932ffeb7a25d667cf2911266c5379acfab20aa9a52c1aa1148d59b.bin.sample
-
Size
14KB
-
MD5
4a42f739ce694db7b3cdd3c233ce7fb1
-
SHA1
68fcc99e719b57308c9b1b3d4eef91dec62d02e5
-
SHA256
307a61c288932ffeb7a25d667cf2911266c5379acfab20aa9a52c1aa1148d59b
-
SHA512
15137fdc43519be2e83346d7a07c84d439e4da22e328722cb3da6bf1bcfbf584b2594901582ddf6ea363ae515e37cb1f32c407a8ebfe747a13562de927f92f54
-
SSDEEP
384:0prr1gkDCgSZ75pbB7E68AvXIHqe939g83FMENKsB:arVDCp/h8QIOwiO
Score10/10-
Detected Xorist Ransomware
-
Drops file in Drivers directory
-
Modifies Installed Components in the registry
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-