General
-
Target
5cf6d2669348a6d1652a6cc16734b8ad9d8684658da92236194a939542242df5.zip
-
Size
1.1MB
-
Sample
240129-rj1x2adadr
-
MD5
ff6bf6b3c0cdb3a9a5d853b59258184d
-
SHA1
11c6571e90ad8d792f5b2215659e9f386f5dc4cc
-
SHA256
679840d8a5aa5a30bc24fc0e03024fb3b447521540eb41ed6227436f6b7b8555
-
SHA512
86806d7d1f789d6f53f812ce068ac99a8b0499ca31d7f684648c3a384c5547a682202653c615c3b98c9786fa666fc6e7e1d00a1740154ab01289cf15e4b70de0
-
SSDEEP
24576:x1/KKFKG26jRJICw4uBbOVNk+BRTtgQkMMmGB6TjL2pKuAuajDzuUo:+n5cPIOY+NtJgQkIZuAj/zI
Behavioral task
behavioral1
Sample
5cf6d2669348a6d1652a6cc16734b8ad9d8684658da92236194a939542242df5.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5cf6d2669348a6d1652a6cc16734b8ad9d8684658da92236194a939542242df5.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
F:\$RECYCLE.BIN\S-1-5-21-3627615824-4061627003-3019543961-1000\ReadMe.txt
https://t.me/secles1bot
http://2kksm7oobarkoedfnkihgsa2qdvfgwvr4p4furcsopummgs5y37s6bid.onion
Extracted
F:\$RECYCLE.BIN\ReadMe.txt
https://t.me/secles1bot
http://2kksm7oobarkoedfnkihgsa2qdvfgwvr4p4furcsopummgs5y37s6bid.onion
Targets
-
-
Target
5cf6d2669348a6d1652a6cc16734b8ad9d8684658da92236194a939542242df5
-
Size
1.1MB
-
MD5
cbd091cac452f86c94499f712c7fb79b
-
SHA1
01d48986d1edfdcca9c2585325f37888b2b3ec84
-
SHA256
5cf6d2669348a6d1652a6cc16734b8ad9d8684658da92236194a939542242df5
-
SHA512
25be58c4c490e209c1f0d43bd03e488833d44c6e00b65d84e4c2871bab5bd5415c6e2b4b8db2c03a3c6c7f8e63572b7c2372f002b17577bcc7ce9318bf71e17b
-
SSDEEP
24576:XBvcNWXatHPiAcShw1cLCY0NH1LxLv8cGBVrXF5QecdGPyGLAB:xvcDtjpMHNJt8cwdFO2adB
-
Clears Windows event logs
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Renames multiple (9597) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Creates new service(s)
-
Drops file in Drivers directory
-
Modifies Installed Components in the registry
-
Stops running service(s)
-
Drops startup file
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Defense Evasion
Impair Defenses
1Indicator Removal
4File Deletion
3Modify Registry
1