General
-
Target
5950b4e27554585123d7fca44e83169375c6001201e3bf26e57d079437e70bcd
-
Size
5.4MB
-
Sample
230925-scy1jaga2v
-
MD5
3d29e9cdd2a9d76e57e8a3f9e6ed3643
-
SHA1
5ad94f5303aed57a9d4f0055f15076454840064a
-
SHA256
5950b4e27554585123d7fca44e83169375c6001201e3bf26e57d079437e70bcd
-
SHA512
942bbbdbaf823329d65dd5ae58a2ec6098b5b35203523aae2c4bf47875730f346e0511a38983dfa8d9673752a546a5bfb4690a145d17a7d2b03f6fe8c659403f
-
SSDEEP
98304:R4Hf6JMfWTMVWWqoMVBk+B4D79mXPepfDgsC8yVP2SuxHf846FAP01B7ZVzO:R4HFtqrVm+B4D7k94LHf8FAKc
Static task
static1
Behavioral task
behavioral1
Sample
5950b4e27554585123d7fca44e83169375c6001201e3bf26e57d079437e70bcd.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
5950b4e27554585123d7fca44e83169375c6001201e3bf26e57d079437e70bcd.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\HOW TO RESTORE YOUR FILES.TXT
Targets
-
-
Target
5950b4e27554585123d7fca44e83169375c6001201e3bf26e57d079437e70bcd
-
Size
5.4MB
-
MD5
3d29e9cdd2a9d76e57e8a3f9e6ed3643
-
SHA1
5ad94f5303aed57a9d4f0055f15076454840064a
-
SHA256
5950b4e27554585123d7fca44e83169375c6001201e3bf26e57d079437e70bcd
-
SHA512
942bbbdbaf823329d65dd5ae58a2ec6098b5b35203523aae2c4bf47875730f346e0511a38983dfa8d9673752a546a5bfb4690a145d17a7d2b03f6fe8c659403f
-
SSDEEP
98304:R4Hf6JMfWTMVWWqoMVBk+B4D79mXPepfDgsC8yVP2SuxHf846FAP01B7ZVzO:R4HFtqrVm+B4D7k94LHf8FAKc
Score10/10-
Detecting the common Go functions and variables names used by Snatch ransomware
-
Snatch Ransomware
Ransomware family generally distributed through RDP bruteforce attacks.
-
Renames multiple (7781) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (7987) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file
-