General
-
Target
4ab785bba778bd582b33baeac2cc9c22.bin
-
Size
39KB
-
Sample
230408-bse4xsbc83
-
MD5
76ae6c6d76db390f0ecda5f64fe6c977
-
SHA1
a07961aeb4037454b4112258ba49ad9e21c95cbc
-
SHA256
7b7c5919ad7f2d46288d3e6396e6aec2debada49240aad85e393f80a9c405e6b
-
SHA512
00d6fbd5ed79c335de78aa6a6ddc434ba373274881075a0b71fc0f8ba505cb2994a03cce9941ebdce3ea0c945a2547dd384cbdd8ef1d7bea53c705e625b4ef5f
-
SSDEEP
768:GNHovg+DOp6cJjg6/kxg0fCcpJYeZR1zUqAAJGScTYSASO4vgXBjv/PNthzm:6+DOscJjgTg0fCuf9UqA4STY88BfDhzm
Static task
static1
Behavioral task
behavioral1
Sample
55c30024aed833336eb4720a1a4a40c78496efb27b3c4d5c3f1d1b5935c12715.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
55c30024aed833336eb4720a1a4a40c78496efb27b3c4d5c3f1d1b5935c12715.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
C:\info.hta
http://www.w3.org/TR/html4/strict.dtd'>
Extracted
C:\Users\Admin\Desktop\info.hta
Extracted
C:\info.hta
http://www.w3.org/TR/html4/strict.dtd'>
Extracted
C:\Users\Admin\Desktop\info.hta
Targets
-
-
Target
55c30024aed833336eb4720a1a4a40c78496efb27b3c4d5c3f1d1b5935c12715.exe
-
Size
56KB
-
MD5
4ab785bba778bd582b33baeac2cc9c22
-
SHA1
23db0ae4d5b7b4fe8698583e25e50e1b89cf9411
-
SHA256
55c30024aed833336eb4720a1a4a40c78496efb27b3c4d5c3f1d1b5935c12715
-
SHA512
916cc0d2e0e623a897d4d515e2148c0b08dd3c308b27b53032def045eafbd625ac2031fd5713e055f4f323a840ed534aaaa5da06586928cc2dbafb46cb276955
-
SSDEEP
1536:bNeRBl5PT/rx1mzwRMSTdLpJyCfPAIotcQ:bQRrmzwR5JyNO
Score10/10-
Modifies boot configuration data using bcdedit
-
Modifies Windows Firewall
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-