General
-
Target
08a62815eabccc8dbc7babe0dfabcae9cb37a20f66373ca0bb7254c7e6c6f1bb
-
Size
1.8MB
-
Sample
230129-v32kfsfe93
-
MD5
87dd6a06cba3e35bc4d3584a78e418ad
-
SHA1
c9b25177db2f6eaddb4b028a9284b4fb5c3ffcd0
-
SHA256
08a62815eabccc8dbc7babe0dfabcae9cb37a20f66373ca0bb7254c7e6c6f1bb
-
SHA512
70db262c8c9886f6608e95e775f9ab340bc1aefc15dbcccf2e751ee0d5ed0ef60f71f6de9ed9fd50c649ebd6c2c1cfe9b668c2522df5216855150b8c9c8779bf
-
SSDEEP
49152:jmz/qUEGpeNQdBtOem4wwFZHBDPWRj+F27YL9IHUYSh:jm/EG4NEOem4ww3yY27yYSh
Behavioral task
behavioral1
Sample
08a62815eabccc8dbc7babe0dfabcae9cb37a20f66373ca0bb7254c7e6c6f1bb.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
08a62815eabccc8dbc7babe0dfabcae9cb37a20f66373ca0bb7254c7e6c6f1bb.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\HOW-TO-DECRYPT-jjj9b.txt
http://o76s3m7l5ogig4u5.onion
Extracted
C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\HOW-TO-DECRYPT-jjj9b.txt
http://o76s3m7l5ogig4u5.onion
Targets
-
-
Target
08a62815eabccc8dbc7babe0dfabcae9cb37a20f66373ca0bb7254c7e6c6f1bb
-
Size
1.8MB
-
MD5
87dd6a06cba3e35bc4d3584a78e418ad
-
SHA1
c9b25177db2f6eaddb4b028a9284b4fb5c3ffcd0
-
SHA256
08a62815eabccc8dbc7babe0dfabcae9cb37a20f66373ca0bb7254c7e6c6f1bb
-
SHA512
70db262c8c9886f6608e95e775f9ab340bc1aefc15dbcccf2e751ee0d5ed0ef60f71f6de9ed9fd50c649ebd6c2c1cfe9b668c2522df5216855150b8c9c8779bf
-
SSDEEP
49152:jmz/qUEGpeNQdBtOem4wwFZHBDPWRj+F27YL9IHUYSh:jm/EG4NEOem4ww3yY27yYSh
Score10/10-
Hades Ransomware
Ransomware family attributed to Evil Corp APT first seen in late 2020.
-
Hades payload
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Deletes itself
-
Loads dropped DLL
-