General
-
Target
VirusShare_cfd2351a65e19f7ff9e09d9f0f2a42db
-
Size
298KB
-
Sample
240204-r7wm8acde6
-
MD5
cfd2351a65e19f7ff9e09d9f0f2a42db
-
SHA1
2ec3342d9c01e0eeeec80b4f5787a6f9a9ce5d50
-
SHA256
a77232cefd0ce412731521cb4143dbaaaf51e69076cafd2e2252c663b2cf00ec
-
SHA512
23aff27d7189229de12b124285442f38c9f3eeefd3a1f5b1fd193c983b9212f419819c869869f373e8a98ff2bbaf94579ca91aa908cecdbf9d190b91697a3718
-
SSDEEP
6144:DLOMYYit9Y5OE3bTWUqboQNYBsQNZVwpEG78SIWw0Rh6:DCKp3+7kQNYBsQfweG7EWwR
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_cfd2351a65e19f7ff9e09d9f0f2a42db.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
VirusShare_cfd2351a65e19f7ff9e09d9f0f2a42db.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\restore_files_iiflx.txt
http://rtldkdh6.kghw88gh3eu.net/7EBEF4304EED371
http://jsdf2wevw2.wrt23wqw34.net/7EBEF4304EED371
https://7vhbukzxypxh3xfy.onion.to/7EBEF4304EED371
http://7vhbukzxypxh3xfy.onion/7EBEF4304EED371
Extracted
C:\PerfLogs\restore_files_eyrhl.txt
http://rtldkdh6.kghw88gh3eu.net/9CE3D3CDE43ADEF8
http://jsdf2wevw2.wrt23wqw34.net/9CE3D3CDE43ADEF8
https://7vhbukzxypxh3xfy.onion.to/9CE3D3CDE43ADEF8
http://7vhbukzxypxh3xfy.onion/9CE3D3CDE43ADEF8
Targets
-
-
Target
VirusShare_cfd2351a65e19f7ff9e09d9f0f2a42db
-
Size
298KB
-
MD5
cfd2351a65e19f7ff9e09d9f0f2a42db
-
SHA1
2ec3342d9c01e0eeeec80b4f5787a6f9a9ce5d50
-
SHA256
a77232cefd0ce412731521cb4143dbaaaf51e69076cafd2e2252c663b2cf00ec
-
SHA512
23aff27d7189229de12b124285442f38c9f3eeefd3a1f5b1fd193c983b9212f419819c869869f373e8a98ff2bbaf94579ca91aa908cecdbf9d190b91697a3718
-
SSDEEP
6144:DLOMYYit9Y5OE3bTWUqboQNYBsQNZVwpEG78SIWw0Rh6:DCKp3+7kQNYBsQfweG7EWwR
Score10/10-
Renames multiple (372) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-