General
-
Target
9fa1ba3e7d6e32f240c790753cdaaf8e.bin
-
Size
1.7MB
-
Sample
231003-b44lnafe9t
-
MD5
9c94d56dbd7081d164318cad59408e0d
-
SHA1
aa197b09a902482914a1039e45c8ff2664d77996
-
SHA256
e5e978c87ca89c047d9337601024d729586b355566432c9d86bf34d858ad7b4c
-
SHA512
d66f4831664ba417f4484a57d044171c18d6bc3c45a9360f4495021fcff6472b12faa2b9de4d6db8e072d2a592185900e58b6148407ee193b4ea93b745b164c9
-
SSDEEP
49152:laPGjn1gLCHhkwgS9rA6v5QoY6tPMIPWw88s:lYGjnmMkwhrA64ErE8s
Behavioral task
behavioral1
Sample
fe997a590a68d98f95ac0b6c994ba69c3b2ece9841277b7fecd9dfaa6f589a87.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
fe997a590a68d98f95ac0b6c994ba69c3b2ece9841277b7fecd9dfaa6f589a87.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\HOW-TO-DECRYPT-gn9cj.txt
Targets
-
-
Target
fe997a590a68d98f95ac0b6c994ba69c3b2ece9841277b7fecd9dfaa6f589a87.bin
-
Size
1.9MB
-
MD5
9fa1ba3e7d6e32f240c790753cdaaf8e
-
SHA1
7bcea3fbfcb4c170c57c9050499e1fae40f5d731
-
SHA256
fe997a590a68d98f95ac0b6c994ba69c3b2ece9841277b7fecd9dfaa6f589a87
-
SHA512
8d2fb58cb8776ead15f445671431eae13a00b48921e545c7ecbf91829015d818d663d9369f181de669ebb771b113c2f675c3a156fac5ede019b5fad9cb8c65fe
-
SSDEEP
49152:zHOalx8WJjq64Hv7OHxTAhEu5undVmB9dn5AI7EyP3S:Z/8WJjiPSRRu5undVmDd5VEyvS
Score10/10-
Hades Ransomware
Ransomware family attributed to Evil Corp APT first seen in late 2020.
-
Hades payload
-
Renames multiple (168) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (243) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-