General
-
Target
10562853704.zip
-
Size
56KB
-
Sample
230530-1b6b8acb4x
-
MD5
0345b34da02f14a431cefa1f3b822b0e
-
SHA1
0f38c99d1920d227189ceb5d35c627811d66577d
-
SHA256
e2fabfc18fc498c954376ae4bc18bed9a832a162b09ea5213c3204cbfa6ee8cd
-
SHA512
bbc53f8059b784e5cf160d7721bd293c7faf39446b5c6a45ee18c11ecfad4c945a01f8887cf05b9304c3965df9b60db95b32be6446e2ff76bd2e90b860776061
-
SSDEEP
768:6TCEBWKRd4AcmoEngTVNlOwsThVhfySY1rYGLCcsTOs6POhmXSUn0c:6TYK/EmPgTVDK1fYh86POEXSUnB
Static task
static1
Behavioral task
behavioral1
Sample
ef0ee6a6a643347082e097f29cd351150b2d4196faef4ce926a307c2ca46f96a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ef0ee6a6a643347082e097f29cd351150b2d4196faef4ce926a307c2ca46f96a.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
C:\PerfLogs\Admin\How To Restore Your Files.txt
Targets
-
-
Target
ef0ee6a6a643347082e097f29cd351150b2d4196faef4ce926a307c2ca46f96a
-
Size
18.1MB
-
MD5
72b4851a0410780bc1d3b65b9b540c33
-
SHA1
b7d1a21f0c13c1bf363048af00fa23ddb9846272
-
SHA256
ef0ee6a6a643347082e097f29cd351150b2d4196faef4ce926a307c2ca46f96a
-
SHA512
2f4647b731f329c4dfd0edd38fb9867dc94e61d2ad39fd27fc8d3c616ee7cec2222c18d1567c24581c6c0bfffd7c40c38a340f28d0db3784094a540a3a63a643
-
SSDEEP
6144:IROPsrQLOJgpZp8LHD4GaNH71dLdGiiFM2AHcH8s:1cH8s
Score10/10-
Renames multiple (204) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (207) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-