General
-
Target
m2.ex
-
Size
2.0MB
-
Sample
230518-ym8klscf4z
-
MD5
b4d346055c102520ea0250509129a392
-
SHA1
65efdd0c5fb90f184f04a093d9c59c3884069d6f
-
SHA256
e6e689c5fbcc757bc0ecc60559909078e73baaba9d6727111651626c12bed436
-
SHA512
df2ff054acacb6eebb9aaf7ccc72de9cfb1b589bf359d86e567a1742f4b917918a7dc47d566cf3103ace2876a8451d1f43719d063030b806b59a4f1ec438f324
-
SSDEEP
24576:dmwhvK6K6lv3szLwGskVdHJ+GQOq8GV2wlC/mhKQG/HsQaUK6A+jg0:IwcM3CtifKQGLFs
Static task
static1
Behavioral task
behavioral1
Sample
m2.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
m2.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
C:\Program Files\7-Zip\FILE RECOVERY.txt
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion/mallox/privateSignin
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion
Extracted
C:\Program Files\7-Zip\Lang\FILE RECOVERY.txt
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion/mallox/privateSignin
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion
Targets
-
-
Target
m2.ex
-
Size
2.0MB
-
MD5
b4d346055c102520ea0250509129a392
-
SHA1
65efdd0c5fb90f184f04a093d9c59c3884069d6f
-
SHA256
e6e689c5fbcc757bc0ecc60559909078e73baaba9d6727111651626c12bed436
-
SHA512
df2ff054acacb6eebb9aaf7ccc72de9cfb1b589bf359d86e567a1742f4b917918a7dc47d566cf3103ace2876a8451d1f43719d063030b806b59a4f1ec438f324
-
SSDEEP
24576:dmwhvK6K6lv3szLwGskVdHJ+GQOq8GV2wlC/mhKQG/HsQaUK6A+jg0:IwcM3CtifKQGLFs
Score10/10-
Renames multiple (2249) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-