General
-
Target
1dcd0f079a72ddd82f144ded212c4c844768474acf59e1cde6ca1194e80fa3a6
-
Size
179KB
-
Sample
230911-r1xa6sgg79
-
MD5
6ecdfd76e99ac7bf571dd21bf4d85fe4
-
SHA1
3b622b03e700c8f5115e0706e7bd510ba18daaab
-
SHA256
1dcd0f079a72ddd82f144ded212c4c844768474acf59e1cde6ca1194e80fa3a6
-
SHA512
42355f470974b0f9ffc3e65331d7384d850858e7c32986d5b004d7384282d9d20c85c5b58e6f0f94784f0ac09c5a669e9241b7a62825fe4b08cbe575df00025f
-
SSDEEP
3072:kuWvdwxYVLSroutnDnQiREOjijPwAhFbwALCYmgBO8ja+8ewQ0UM44Fn3fzT45:kuAwxVoSnDQi7kRtLCY88ja+8ewQStFI
Malware Config
Targets
-
-
Target
1dcd0f079a72ddd82f144ded212c4c844768474acf59e1cde6ca1194e80fa3a6
-
Size
179KB
-
MD5
6ecdfd76e99ac7bf571dd21bf4d85fe4
-
SHA1
3b622b03e700c8f5115e0706e7bd510ba18daaab
-
SHA256
1dcd0f079a72ddd82f144ded212c4c844768474acf59e1cde6ca1194e80fa3a6
-
SHA512
42355f470974b0f9ffc3e65331d7384d850858e7c32986d5b004d7384282d9d20c85c5b58e6f0f94784f0ac09c5a669e9241b7a62825fe4b08cbe575df00025f
-
SSDEEP
3072:kuWvdwxYVLSroutnDnQiREOjijPwAhFbwALCYmgBO8ja+8ewQ0UM44Fn3fzT45:kuAwxVoSnDQi7kRtLCY88ja+8ewQStFI
-
CrypVault
Ransomware family which makes encrypted files look like they have been quarantined by AV.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Modifies boot configuration data using bcdedit
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-