General
-
Target
2159739a68fa270eb94caddbb7f5d132b1175716efab3b3f25f86dc57c4c0db4.exe
-
Size
400KB
-
Sample
240109-vjvb2aeecl
-
MD5
9476b5f481090ea650cfc65e017dc41c
-
SHA1
0fa937125a55c299a48d3e1485fee16646555087
-
SHA256
2159739a68fa270eb94caddbb7f5d132b1175716efab3b3f25f86dc57c4c0db4
-
SHA512
f97c6bf23101bf357d8e4a4ae47421ecfe8f12c821c036e09a4768a8f0dd9e12ba128cf5f10a0f5d4767ac6a3b7f3497f95ffc07d18ac2b9b4a14c9a2c9c9b6d
-
SSDEEP
12288:/4sAED7kDhOztcOTx00ll7Qbnck6i+JQnlopoMaJU:iEXkDQztfe0szc3nCloy7
Static task
static1
Behavioral task
behavioral1
Sample
2159739a68fa270eb94caddbb7f5d132b1175716efab3b3f25f86dc57c4c0db4.exe
Resource
win10-20231220-en
Malware Config
Extracted
C:\PerfLogs\howto_recover_file_dxmfw.txt
http://fg347djvb.poin84mdgu9e.com/F8952F6717A19B37
http://hfy28djd6dh.rg7hdts4d2sjfy.com/F8952F6717A19B37
https://3st7uyjfocyourll.onion.to/F8952F6717A19B37
http://3st7uyjfocyourll.onion/F8952F6717A19B37
Targets
-
-
Target
2159739a68fa270eb94caddbb7f5d132b1175716efab3b3f25f86dc57c4c0db4.exe
-
Size
400KB
-
MD5
9476b5f481090ea650cfc65e017dc41c
-
SHA1
0fa937125a55c299a48d3e1485fee16646555087
-
SHA256
2159739a68fa270eb94caddbb7f5d132b1175716efab3b3f25f86dc57c4c0db4
-
SHA512
f97c6bf23101bf357d8e4a4ae47421ecfe8f12c821c036e09a4768a8f0dd9e12ba128cf5f10a0f5d4767ac6a3b7f3497f95ffc07d18ac2b9b4a14c9a2c9c9b6d
-
SSDEEP
12288:/4sAED7kDhOztcOTx00ll7Qbnck6i+JQnlopoMaJU:iEXkDQztfe0szc3nCloy7
Score10/10-
Renames multiple (850) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-