General
-
Target
catb_rw.zip
-
Size
89KB
-
Sample
230321-gj25zsba2t
-
MD5
2ad6dc40bf35e093f4c790478c43d02f
-
SHA1
2470fd72bd1caa3bfc8ea1f553dedd0fabf6971e
-
SHA256
0187d01b2b721ca37a60e475bc43ebb04b894cfdaea327e74bc7f9e30617741f
-
SHA512
ddff389178255ed02e0b82a5d5d7d214db8d00d8e3afab749906e9c4eed5ec4f66502705171a87ca733fb77e810a6bc2dd8fc07d15c77372f9f00c772afb9461
-
SSDEEP
1536:qF3OXEALLzH5z39yXjUUVmJ6LIn7P5MU+sJ/9wL2mI3AuXCbi+VzqrO0OjOaqVCH:qF3OUALLdgAsm2In7P5n/m9I3psi+Vzf
Static task
static1
Behavioral task
behavioral1
Sample
9990388776daa57d2b06488f9e2209e35ef738fd0be1253be4c22a3ab7c3e1e2.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
9990388776daa57d2b06488f9e2209e35ef738fd0be1253be4c22a3ab7c3e1e2.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Comms\UnistoreDB\store.vol
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\DawnCache\data_3
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extension State\CURRENT
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extension State\MANIFEST-000001
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.58.4_0\_locales\id\messages.json
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.58.4_0\_locales\sl\messages.json
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.58.4_0\_locales\zu\messages.json
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\it\messages.json
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\pl\messages.json
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\ro\messages.json
Targets
-
-
Target
9990388776daa57d2b06488f9e2209e35ef738fd0be1253be4c22a3ab7c3e1e2
-
Size
160KB
-
MD5
edc87da8654e966bee0e5c9b92ed67cb
-
SHA1
db99fc79a64873bef25998681392ac9be2c1c99c
-
SHA256
9990388776daa57d2b06488f9e2209e35ef738fd0be1253be4c22a3ab7c3e1e2
-
SHA512
23f5d297f0fa88c743a02bdb24f85a5e3ba6e32378a513e1e407df259e1d52bae78007f35f9731ede8e8fafe6234ea459c1efea3f7c2e6fe8ae4456a72ea6497
-
SSDEEP
3072:hkEX9cOsQDqXX+nJZ0pVfdjHHO50gpy2RHawPZtOzR:tK6DqozABnO5jtyF
Score10/10-
Modifies Installed Components in the registry
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops startup file
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-