General
-
Target
307a61c288932ffeb7a25d667cf2911266c5379acfab20aa9a52c1aa1148d59b.exe
-
Size
23KB
-
Sample
240126-mw3vyadbhk
-
MD5
71d9e6ee26d46c4dbb3d8e6df19dda7d
-
SHA1
a88176cdd3df153349104442eac4e2d1c416e457
-
SHA256
ec09cfa4a79d709daed859d1a0e131aaa994f4a7b4bed80406125db76446fbda
-
SHA512
d6a61d6d32bf636bec7948323a422116b359dadf78e55327633ad5c3de41e6c15dcadd27a8c53453ef14dd63184c22dee82420b99338f5cc7359e9f6ec50cca7
-
SSDEEP
384:eebFNw4Pk1itKkpAjjI2Ypdm/nYi/8lhRea16Wv88oyLOixGqKWW0o:e0FmBkpKjPYpudR4v8x3iAE
Behavioral task
behavioral1
Sample
307a61c288932ffeb7a25d667cf2911266c5379acfab20aa9a52c1aa1148d59b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
307a61c288932ffeb7a25d667cf2911266c5379acfab20aa9a52c1aa1148d59b.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\HOW TO DECRYPT FILES.txt
1NJNG57hFPPcmSmFYbxKmL33uc5nLwYLCK
Targets
-
-
Target
307a61c288932ffeb7a25d667cf2911266c5379acfab20aa9a52c1aa1148d59b.exe
-
Size
23KB
-
MD5
71d9e6ee26d46c4dbb3d8e6df19dda7d
-
SHA1
a88176cdd3df153349104442eac4e2d1c416e457
-
SHA256
ec09cfa4a79d709daed859d1a0e131aaa994f4a7b4bed80406125db76446fbda
-
SHA512
d6a61d6d32bf636bec7948323a422116b359dadf78e55327633ad5c3de41e6c15dcadd27a8c53453ef14dd63184c22dee82420b99338f5cc7359e9f6ec50cca7
-
SSDEEP
384:eebFNw4Pk1itKkpAjjI2Ypdm/nYi/8lhRea16Wv88oyLOixGqKWW0o:e0FmBkpKjPYpudR4v8x3iAE
Score10/10-
Renames multiple (11497) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops file in Drivers directory
-
Modifies Installed Components in the registry
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-