General
-
Target
d28f799d666a23fda187776242073993
-
Size
101KB
-
Sample
231228-kaf3yacgh8
-
MD5
d28f799d666a23fda187776242073993
-
SHA1
33228c4a1dfe34c2ddd8400300890447dc951f7c
-
SHA256
f9c4ddad16bf3d2446639ed848334a2c1741af3fab677199c7aef6b5bf6f098e
-
SHA512
85c27c26b9d322da4ea228be4b23e4b9b036ab6fa61d211c1e150fb88af556ef1c28c1f038d354fb9b34a3eb4911f8e278aa42632b2a4eacc1cf511f67962ff5
-
SSDEEP
3072:ef1BDZ0kVB67Duw9AMc9sKXbxGM63ikxBbcy6TwYpgI:e9X0G1x363ikxewYpJ
Static task
static1
Behavioral task
behavioral1
Sample
d28f799d666a23fda187776242073993.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
d28f799d666a23fda187776242073993.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\readme-warning.txt
makop
Targets
-
-
Target
d28f799d666a23fda187776242073993
-
Size
101KB
-
MD5
d28f799d666a23fda187776242073993
-
SHA1
33228c4a1dfe34c2ddd8400300890447dc951f7c
-
SHA256
f9c4ddad16bf3d2446639ed848334a2c1741af3fab677199c7aef6b5bf6f098e
-
SHA512
85c27c26b9d322da4ea228be4b23e4b9b036ab6fa61d211c1e150fb88af556ef1c28c1f038d354fb9b34a3eb4911f8e278aa42632b2a4eacc1cf511f67962ff5
-
SSDEEP
3072:ef1BDZ0kVB67Duw9AMc9sKXbxGM63ikxBbcy6TwYpgI:e9X0G1x363ikxewYpJ
Score10/10-
Renames multiple (8187) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-