General
-
Target
RMTGXSC.bin.zip
-
Size
463KB
-
Sample
230616-jg4l5sdd6z
-
MD5
6e97b80c0ee2bb99749062143ecc990d
-
SHA1
418bdc9f4f86d98a5895e038eaf5085be8430d42
-
SHA256
ab621510d52a8815cc0162c5bc29dbc525734ea29ff6586cd24abdeac6dcaec0
-
SHA512
3945363b38858d611bd18dd77bb3e1f3d7fd09150d7d673e16f135aa5912c13e65e83ae5433a44476d96868316918550060ba86679c0c06cfd347d9fd9ae74ed
-
SSDEEP
12288:/ygHCArzGG8P20H6e2HsODrNrXDaO4tm9m5sF5:/XHhSG420j2HRpAc9Ss/
Behavioral task
behavioral1
Sample
RMTGXSC.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
RMTGXSC.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
C:\Users\Admin\Favorites\Microsoft Websites\[email protected] Readme.txt
Extracted
C:\Users\Admin\Documents\OneNote Notebooks\My Notebook\[email protected] Readme.txt
Targets
-
-
Target
RMTGXSC.bin
-
Size
483KB
-
MD5
5097acd1e5dfea3d734788584b148d0a
-
SHA1
2194df0f5d37664dcaf069e7a84b5c38fc55bbff
-
SHA256
ce43e9b8fd7c4442c9fdbbf3a236bdb63e05b9dd23b57e1ac184a0e4e861c25c
-
SHA512
54fb01f16a18420d2ed6232c8161b327b529965c99eda2c029bd7e80219d050b06efa1c89abe017a045aac6f9f7ffcd7ca83e8a799022adfde01c8786e455db4
-
SSDEEP
12288:qsHzOUNUSB/o5LsI1uwajJ5yvv1l2EepGHNu4n4UUxa34EPf:diUmSB/o5d1ubcvjI4ftHX
Score10/10-
Modifies boot configuration data using bcdedit
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-