General
-
Target
JC_df430ab9f5084a3e62a6c97c6c6279f2461618f038832305057c51b441c648d9
-
Size
2.2MB
-
Sample
230901-ykbsvshf62
-
MD5
84820f3eb491a2fde1f52435cd29646c
-
SHA1
8c6e135495fcf8898de62e6793e3cd06d3025461
-
SHA256
df430ab9f5084a3e62a6c97c6c6279f2461618f038832305057c51b441c648d9
-
SHA512
68d01c2baf9240c3f117acf211f7d253cbe37c2ccdf22ec0688607d35f7f5fb29e9f0aa0f0d9e60363333238028be1f3ca2b774ea8eed4df52fe4417eb27faae
-
SSDEEP
24576:8J/+56Kus0jCcT8kgTe5Gq10TgoFf25QVDGxkl2JM6ioM93gBFfMEzNiYlg055Ws:8pFg0MYq+W249vZGqsCz9/K7E8gx1z1
Static task
static1
Behavioral task
behavioral1
Sample
JC_df430ab9f5084a3e62a6c97c6c6279f2461618f038832305057c51b441c648d9.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
JC_df430ab9f5084a3e62a6c97c6c6279f2461618f038832305057c51b441c648d9.exe
Resource
win10v2004-20230831-en
Malware Config
Extracted
C:\Program Files\Common Files\System\Ole DB\de-DE\README_TO_DECRYPT.txt
https://qtox.github.io
https://tox.chat/download.html
Targets
-
-
Target
JC_df430ab9f5084a3e62a6c97c6c6279f2461618f038832305057c51b441c648d9
-
Size
2.2MB
-
MD5
84820f3eb491a2fde1f52435cd29646c
-
SHA1
8c6e135495fcf8898de62e6793e3cd06d3025461
-
SHA256
df430ab9f5084a3e62a6c97c6c6279f2461618f038832305057c51b441c648d9
-
SHA512
68d01c2baf9240c3f117acf211f7d253cbe37c2ccdf22ec0688607d35f7f5fb29e9f0aa0f0d9e60363333238028be1f3ca2b774ea8eed4df52fe4417eb27faae
-
SSDEEP
24576:8J/+56Kus0jCcT8kgTe5Gq10TgoFf25QVDGxkl2JM6ioM93gBFfMEzNiYlg055Ws:8pFg0MYq+W249vZGqsCz9/K7E8gx1z1
Score10/10-
Clears Windows event logs
-
Renames multiple (113) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-