General
-
Target
9893de16867126eeb989265cd99fd201.bin
-
Size
426KB
-
Sample
230130-xts8tsdd7s
-
MD5
fbcd3e444307066ce4910440e1f7a15b
-
SHA1
c84d6e28ddd820bc12b0da9940f7c4a00c577919
-
SHA256
c5da0c48c4abb688415f8d11a374647d047f2d99e8b01145567ab68d30b86a69
-
SHA512
640aaea430360cd3fe02181a2ebfffd77ebe89510c6926d3778c562bcbf93c7e9c25e3f1fb4270b4272e7a2e51fe601f718b6edf13083d7ab589858e6ef0e47b
-
SSDEEP
12288:1vZiDr9DsfnqSxz0CKDpXvUeuM+M8Nvva6t2:1ODgqIz0CoMn/3NvC6o
Static task
static1
Behavioral task
behavioral1
Sample
13933403b4b5d79da1decbc41867c842e3577bcba8ce3859f7d9b881348ad377.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
13933403b4b5d79da1decbc41867c842e3577bcba8ce3859f7d9b881348ad377.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\info.hta
Targets
-
-
Target
13933403b4b5d79da1decbc41867c842e3577bcba8ce3859f7d9b881348ad377.exe
-
Size
607KB
-
MD5
9893de16867126eeb989265cd99fd201
-
SHA1
71e0c3ee67daffada30a0bcd3abafaf59cfa8b5d
-
SHA256
13933403b4b5d79da1decbc41867c842e3577bcba8ce3859f7d9b881348ad377
-
SHA512
d7e175b821f3cef659c57b0f46abc35bb11f3dd47c8acdf1aa534c5faa88131e82aa2eebb0e5bfdb16a545356af975daac64a70085eee64196c5e5dfc92995ea
-
SSDEEP
12288:o6pGFv42oseLA5Gt/arlTT6zncVUJ7vnK6U:o6pEA25WQm/cTT6DNK6U
Score10/10-
Disables Task Manager via registry modification
-
Modifies Windows Firewall
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-