General
-
Target
HEUR-Trojan.Win32.Generic-83f549e4db93384add65c4203bf80d1eb9b7b5272b9636e77532284d8b760928
-
Size
76KB
-
Sample
230425-v1devabg95
-
MD5
56895d0a3d6b6f9107448c4c94c8608e
-
SHA1
cf0243d461f1b820df9861ea5930a02c211d8ef6
-
SHA256
83f549e4db93384add65c4203bf80d1eb9b7b5272b9636e77532284d8b760928
-
SHA512
d8893fb5b7ddf854f85a3196d2d2b9ea6807ea9c1937b7a7fcfae2261ba9eaab2d18b66646e93ffec21d64caccdba9e2b1f3fc4e0be006c837c3df8493ec4b49
-
SSDEEP
1536:dPpMF9fS4PUP511AtDxD93D+e+xKiSUrJTsD:za4P511INpCe2LrJTs
Static task
static1
Behavioral task
behavioral1
Sample
HEUR-Trojan.Win32.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
HEUR-Trojan.Win32.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
C:\PerfLogs\HELP_DECRYPT_YOUR_FILES.TXT
Extracted
C:\Program Files\HELP_DECRYPT_YOUR_FILES.TXT
Targets
-
-
Target
HEUR-Trojan.Win32.Generic-83f549e4db93384add65c4203bf80d1eb9b7b5272b9636e77532284d8b760928
-
Size
76KB
-
MD5
56895d0a3d6b6f9107448c4c94c8608e
-
SHA1
cf0243d461f1b820df9861ea5930a02c211d8ef6
-
SHA256
83f549e4db93384add65c4203bf80d1eb9b7b5272b9636e77532284d8b760928
-
SHA512
d8893fb5b7ddf854f85a3196d2d2b9ea6807ea9c1937b7a7fcfae2261ba9eaab2d18b66646e93ffec21d64caccdba9e2b1f3fc4e0be006c837c3df8493ec4b49
-
SSDEEP
1536:dPpMF9fS4PUP511AtDxD93D+e+xKiSUrJTsD:za4P511INpCe2LrJTs
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-