General
-
Target
c3ccde9c3fab53d5c749b2186e997bdc.bin
-
Size
40KB
-
Sample
230421-cjmyvafe5w
-
MD5
a3e5ae7ab396cd94a7f0bfd1706f7c2f
-
SHA1
34c075b6214fc587abd12bdcc8a78f5001430344
-
SHA256
96b0ffdb1184131df6b55228e4a25e5241a585b6dc54a8f4a3e053dd7938dbfb
-
SHA512
ea00acabaa6205078ad873ebb00e9e8373d3f37379553c1929b54ab8be5d592c5b3827c66e34ceff6ddc692300ccb0641ad1821717ced72e5d32abe68850e7a2
-
SSDEEP
768:PV+yDHcSRzP7SQJ0BccXhWFDyVJqzh7Jeg8VDPqe0vnIGyupUpkwGLJ4S:PV9D5cQecc5md8F90vnIGy5pkwGV4S
Static task
static1
Behavioral task
behavioral1
Sample
c21de9109580e03f0fc0a71c10bfe2923927eb0dfe748bea47d550f1fe7f1715.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
c21de9109580e03f0fc0a71c10bfe2923927eb0dfe748bea47d550f1fe7f1715.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
C:\Users\Public\Desktop\info.hta
class='mark'>[email protected]</span></div>
http://www.w3.org/TR/html4/strict.dtd'>
Extracted
C:\users\public\desktop\info.hta
Extracted
C:\info.hta
class='mark'>[email protected]</span></div>
http://www.w3.org/TR/html4/strict.dtd'>
Extracted
C:\Users\Admin\Desktop\info.hta
Targets
-
-
Target
c21de9109580e03f0fc0a71c10bfe2923927eb0dfe748bea47d550f1fe7f1715.exe
-
Size
56KB
-
MD5
c3ccde9c3fab53d5c749b2186e997bdc
-
SHA1
b494a696f4edbbd3831163dfd0f1b5efc134d068
-
SHA256
c21de9109580e03f0fc0a71c10bfe2923927eb0dfe748bea47d550f1fe7f1715
-
SHA512
2b72d43c3eba735ed69807f858ff59685df91fb7012d7bd868a08f0563c00832310fe9d7d160d5b633bc49c1f1d4b7c20c6ab2d9a39eea33ff8d00b683ccb586
-
SSDEEP
1536:SNeRBl5PT/rx1mzwRMSTdLpJcQvW5NoDXMmX9S/b8V:SQRrmzwR5JsNoDcmXI/b8V
Score10/10-
Modifies boot configuration data using bcdedit
-
Modifies Windows Firewall
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-