General
-
Target
51b8a283f87a95edb5e98125e5730bcf843fc7ec8fcdc175c8dc0ba3032e8a51.zip
-
Size
170KB
-
Sample
231023-ddrwaaff34
-
MD5
d6af5a78cd55aca8c2cca1050d7044f9
-
SHA1
83396ea9cf28ae42849dfb5f3c0df312a3b84da7
-
SHA256
2d06acb71440e4c8f46cf347fffd14f5162542edb3fdcc69b089588e3641723b
-
SHA512
61288f41bc5cea56651c6254c3ef65620e3a08fa9ffbef84c3b5b494a7461e68fbe681ca83331f21f7b66ee18a48f9fe400a7dc7198de865947c6bdbff2ed132
-
SSDEEP
3072:hKrwB8OR3UZ+wFLBh6fukYWhWtr0Fy0spPaSSv6xZE1oHFo9OV0Zw+RSw/cciB2W:hKcBHR3VCP6oaYsSD7Fo9zRz/ccU2W
Behavioral task
behavioral1
Sample
51b8a283f87a95edb5e98125e5730bcf843fc7ec8fcdc175c8dc0ba3032e8a51.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
\Device\HarddiskVolume1\Boot\bg-BG\HOW_TO_BACK_FILES.html
Targets
-
-
Target
51b8a283f87a95edb5e98125e5730bcf843fc7ec8fcdc175c8dc0ba3032e8a51.exe
-
Size
340KB
-
MD5
714870c33ba84e744b84b32e6e114ed9
-
SHA1
840f442d4466713becdf72b88846871330ac38e7
-
SHA256
51b8a283f87a95edb5e98125e5730bcf843fc7ec8fcdc175c8dc0ba3032e8a51
-
SHA512
270c584cc9f696de3421429627a07bfbd7829a033cfdc16280e7e233e8ae09e2f1cd0341537a6b050811683d93a14a1465aa3ab96e9577c98ebea521faae65f2
-
SSDEEP
6144:PNs9prB0CnszdPZxMzk1ukSXa9bnuDOeFdGpBP7ENf3zcfUE:y9RaPZxMzk1uBXa9bu2JeAfUE
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies boot configuration data using bcdedit
-
Renames multiple (6946) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Modifies Installed Components in the registry
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-