General
-
Target
7eeb07b3e012c8722c9712ca1b82bab3ef74cdf928f47536733d7a5946ae43b8
-
Size
21KB
-
Sample
240203-vpylmsecb9
-
MD5
a3ec315f74f4eb882253bb147a4ab410
-
SHA1
02bff27c982f24e7472df1c0284dfb1e46a2cc3c
-
SHA256
7eeb07b3e012c8722c9712ca1b82bab3ef74cdf928f47536733d7a5946ae43b8
-
SHA512
a5349e7e2b12608114297bb35820c52198bb1631d8293483f410a0a24be6a14a8adde230814e6cf071e7d026fcd7595f470440c4eacc625b3722a2a4542fbcdb
-
SSDEEP
384:7rwgu4oJuTJj+XZ9Y9qkyUI07jn6qq9fUaIfqfxWkqxrF6ZlvH38R0VKRxxxxxb0:HaJU+Je9Lwjn9fU7q55AQDHr7V
Behavioral task
behavioral1
Sample
7eeb07b3e012c8722c9712ca1b82bab3ef74cdf928f47536733d7a5946ae43b8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7eeb07b3e012c8722c9712ca1b82bab3ef74cdf928f47536733d7a5946ae43b8.exe
Resource
win10v2004-20231222-en
Malware Config
Extracted
C:\Users\Admin\Desktop\readme-warning.txt
makop
Targets
-
-
Target
7eeb07b3e012c8722c9712ca1b82bab3ef74cdf928f47536733d7a5946ae43b8
-
Size
21KB
-
MD5
a3ec315f74f4eb882253bb147a4ab410
-
SHA1
02bff27c982f24e7472df1c0284dfb1e46a2cc3c
-
SHA256
7eeb07b3e012c8722c9712ca1b82bab3ef74cdf928f47536733d7a5946ae43b8
-
SHA512
a5349e7e2b12608114297bb35820c52198bb1631d8293483f410a0a24be6a14a8adde230814e6cf071e7d026fcd7595f470440c4eacc625b3722a2a4542fbcdb
-
SSDEEP
384:7rwgu4oJuTJj+XZ9Y9qkyUI07jn6qq9fUaIfqfxWkqxrF6ZlvH38R0VKRxxxxxb0:HaJU+Je9Lwjn9fU7q55AQDHr7V
-
Modifies boot configuration data using bcdedit
-
Renames multiple (9832) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
UPX dump on OEP (original entry point)
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-