General
-
Target
snatch.bin.gz
-
Size
2.5MB
-
Sample
230607-bzsctsgh8v
-
MD5
6220287f87ff3faca8c13a1e3538992e
-
SHA1
43347dc4b7de70047299a94077d01c8db01573de
-
SHA256
5d81030fa79538850bef6375df9bdaebffd251271a04b984d356de49ac208bfb
-
SHA512
b8d1bac09527428b185acba9ed8742d164695315aa9b34935f409ef78213840c4c01aa430b98725ba83f5b4c6ee301c4449e41c248e8a96ca36dcd46dff7eaac
-
SSDEEP
49152:8+C0sw8Opz8dLYy9H0qIorAj9tXt+krhcnfceKu09BjArM1rqDO4rJunWqo:LCPIpcLY4IorAj9Rt+OhKfcdBjAKWDOY
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\HOW TO RESTORE YOUR FILES.TXT
Targets
-
-
Target
sample
-
Size
2.5MB
-
MD5
2bbff2111232d73a93cd435300d0a07e
-
SHA1
b93d633d379052f0a15b0f9c7094829461a86dbb
-
SHA256
3160b4308dd9434ebb99e5747ec90d63722a640d329384b1ed536b59352dace6
-
SHA512
566ebe109cc4550363a4336fb905b8009bd66a1389cc9cfcd79ffbbd59fe957b1f2cbcfb431b9d707e03f78133b802c8367b022421dff6eb71962c5b6d4ea402
-
SSDEEP
49152:B+CUkw0e9xep5A4354qUoJo5DtjDgk9bcnfoEKSMBB90hMhlqTO4rpun4I:4CVG9y5ASUoJo5D5DgmbKfotB902QTOw
Score10/10-
Detecting the common Go functions and variables names used by Snatch ransomware
-
Snatch Ransomware
Ransomware family generally distributed through RDP bruteforce attacks.
-
Renames multiple (7775) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (8974) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops startup file
-