General
-
Target
ratnik.txt
-
Size
21B
-
Sample
240207-k9t4vagdcp
-
MD5
6ec911c79fcffa22e46079292a793f13
-
SHA1
d4842709ea2737b81f7b2a624232b865f0cbd709
-
SHA256
fe72988e58e7c97db9d8709ad546b2db7cf2a46e52d56ecb60a916c38521eac2
-
SHA512
7a53fa1f36de8bfb047600a636b3be1055c6ec68eb28d0e929a6f1d27632296442dced59c7f2a8664b1ac49f975bde062c349cca24a0afeb23cc2d662efef412
Static task
static1
Behavioral task
behavioral1
Sample
ratnik.txt
Resource
win10-20231220-en
Malware Config
Extracted
C:\Program Files\7-Zip\Lang\DECRYPT_YOUR_FILES.HTML
Targets
-
-
Target
ratnik.txt
-
Size
21B
-
MD5
6ec911c79fcffa22e46079292a793f13
-
SHA1
d4842709ea2737b81f7b2a624232b865f0cbd709
-
SHA256
fe72988e58e7c97db9d8709ad546b2db7cf2a46e52d56ecb60a916c38521eac2
-
SHA512
7a53fa1f36de8bfb047600a636b3be1055c6ec68eb28d0e929a6f1d27632296442dced59c7f2a8664b1ac49f975bde062c349cca24a0afeb23cc2d662efef412
Score10/10-
Renames multiple (4147) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Disables Task Manager via registry modification
-
Drops startup file
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-