General
-
Target
053cec40ef1b8c148c4c1f798509e8b33e0f86f81555307b65e9fdffd670b9fa.exe.zip
-
Size
240KB
-
Sample
231031-rhgsrsbf32
-
MD5
decedfd64d6cac134be566590caa08c4
-
SHA1
baa7fe4608308a5cf97eb9523248fea45c4876f9
-
SHA256
13b3d4048d3d680186a1002b6a3ccf3f9f533e4e78c9a462a0082228513271db
-
SHA512
3603fa3c7d05049abb03ecc388ba53b1b0c8a6b8f07a562816d41d43317e7da03afcc9e56feeda1e289f49a7615aa19403e86ed5bca6a6a3a783993bc6a874d6
-
SSDEEP
3072:B6UP6lqyntW6iug8ooAaW91t0Rrt2DyEQGu0n7xuyxBhRXQ5QMK4mktsYxzBLn:al/tLiuziouyE/PxB7AhKnOXxzBT
Behavioral task
behavioral1
Sample
053cec40ef1b8c148c4c1f798509e8b33e0f86f81555307b65e9fdffd670b9fa.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
053cec40ef1b8c148c4c1f798509e8b33e0f86f81555307b65e9fdffd670b9fa.exe
Resource
win10v2004-20231023-en
Malware Config
Targets
-
-
Target
053cec40ef1b8c148c4c1f798509e8b33e0f86f81555307b65e9fdffd670b9fa.exe
-
Size
249KB
-
MD5
33862bca1fe73d44277e9ad4f0aa81e1
-
SHA1
e900bf9dc2ad2b18e362c8d42ae8e8ce74fb3ff1
-
SHA256
053cec40ef1b8c148c4c1f798509e8b33e0f86f81555307b65e9fdffd670b9fa
-
SHA512
08c0ef71dcab39f772abf17b2c714bc89fe2add6fa61f734ea04c05770ad93a68e5fd9caf73d740c3c17dce1ebb0563b0bd82b20fc6a7e508a778bccbbf8384c
-
SSDEEP
6144:VFVg9EpWQxCKDgqLSV2hIq45K4O4xDL1UnhvHNJ7h0W93MPNdLM7G:/VgGD4KNWViIq4pOOPipHlzsQ7
Score10/10-
Jigsaw Ransomware
Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.
-
Renames multiple (384) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-