General
-
Target
8752a7a052ba75239b86b0da1d483dd7.bin
-
Size
52KB
-
Sample
230608-b322faba4z
-
MD5
3e4bdfe289b837d7a0102a57f9c7629e
-
SHA1
ee492aa38b2d07351f46452f9def83a59a007ac0
-
SHA256
dda1f8f776539f93daaa1e1b955d6a395fc689ab31afd8fac54ebdc90e183d71
-
SHA512
e4747c76096d6c70d321c198f292284bd0a82c4af361ba1568eb2824dec69cf43a8cce94053b8643927e619bdc7fce0cd1ee5ca2673d5010b3257b6c311de386
-
SSDEEP
1536:NqkhpIRfr/G0JCeiaGgW6kc3I2pW05r3c:NXjSS0JQItI29tc
Static task
static1
Behavioral task
behavioral1
Sample
3320f11728458d01eef62e10e48897ec1c2277c1fe1aa2d471a16b4dccfc1207.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3320f11728458d01eef62e10e48897ec1c2277c1fe1aa2d471a16b4dccfc1207.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
C:\MSOCache\ClopReadMe.txt
clop
Targets
-
-
Target
3320f11728458d01eef62e10e48897ec1c2277c1fe1aa2d471a16b4dccfc1207.exe
-
Size
100KB
-
MD5
8752a7a052ba75239b86b0da1d483dd7
-
SHA1
6eeef883d209d02a05ae9e6a2f37c6cbf69f4d89
-
SHA256
3320f11728458d01eef62e10e48897ec1c2277c1fe1aa2d471a16b4dccfc1207
-
SHA512
57d19e9254ecaeaf301e11598c88b1440f3f85baf0cb8d7a0ac952cd6d63f565df9809b13f50a059302bfb0f81a5c498e49837e2e9480ec9b51c14a409fbdb65
-
SSDEEP
1536:gHIPkRUedYttp2bd/B8quuaOY2IfpW+VQJFsW69cdCeRk28+axHPjsb5:EYtLqJSquu42CW+VwisCgk2DaxHPj+5
Score10/10-
Clop
Ransomware discovered in early 2019 which has been actively developed since release.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-