General
-
Target
dc09c3148ba09028fe0a43efd287917b.bin
-
Size
39KB
-
Sample
230127-rqeclsdb3t
-
MD5
5b491398922c5a4ceb79927e3282139b
-
SHA1
7bbcd84b838b8ba716e137edd02334028ac6d9d1
-
SHA256
6bb2bc0bcbadcdc1888542d77ca2d1fc86578206ff8ee3239d0d78e63238499a
-
SHA512
1cda892dba1e0f0747700ed3f4594105f243fffa52e5363c387fe1984e2492b6b6affcc119cbdeba9ad54dc2aa40a217837f8d73b78143b9514965666ce54e35
-
SSDEEP
768:PJe1uxunuBXyCdMWw9pzyavGC7UVqTbxdKLy7Cdv4w8NS1FTvE7+P4U95:PkWqCRw9hya+CrPKACJ4wJTvYU35
Static task
static1
Behavioral task
behavioral1
Sample
b54d6dc708eade0818fcf91e59c7dbe37267abbe43a1672fb5f1c126e021ad7d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b54d6dc708eade0818fcf91e59c7dbe37267abbe43a1672fb5f1c126e021ad7d.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
C:\users\public\desktop\info.hta
Extracted
C:\Users\Admin\Desktop\info.hta
Targets
-
-
Target
b54d6dc708eade0818fcf91e59c7dbe37267abbe43a1672fb5f1c126e021ad7d.exe
-
Size
56KB
-
MD5
dc09c3148ba09028fe0a43efd287917b
-
SHA1
fea5a0668ddd1a7278c934276c2efada3ee2287a
-
SHA256
b54d6dc708eade0818fcf91e59c7dbe37267abbe43a1672fb5f1c126e021ad7d
-
SHA512
ee411ef051eb03bdb1f9bbddda987ec08bc80ab0c431b78abb52926794530db29e4a01ccbb325c15225d530e579b8f5678a948a378ebf70e8aa071d528505c36
-
SSDEEP
1536:sNeRBl5PT/rx1mzwRMSTdLpJjYizrtZF:sQRrmzwR5J9zrZ
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies boot configuration data using bcdedit
-
Modifies Windows Firewall
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-