Analysis

  • max time kernel
    0s
  • platform
    windows10-1703_x64
  • resource
    win10-20231215-en
  • resource tags

    arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11/02/2024, 12:21

General

  • Target

    public/steambootstrapper_ukrainian.txt

  • Size

    6KB

  • MD5

    cadd7a2f359b22580bdd6281ea23744d

  • SHA1

    e82e790a7561d0908aee8e3b1af97823e147f88b

  • SHA256

    3dd0edfbe68236e668fb308f92fe7c6493dbb05bfca85a48de93588f479ccc99

  • SHA512

    53672dd13e6ccbe96f6d4a61297c595b6d6cba8de92caa51ccf8ab1d8a82eea5a425eab348f295b9ec27de0026ef849d9230f751a46e040be8863923f91b8519

  • SSDEEP

    192:RQqEG5oFQE3FqioFq2rYFdpp0XnZZSEbUFvxlDl2oC38gv851e:RxEoAQE1PAfM/pp0XnZ0nvHDl2X38gvr

Score
1/10

Malware Config

Signatures

  • Opens file in notepad (likely ransom note) 1 IoCs

Processes

  • C:\Windows\system32\NOTEPAD.EXE
    C:\Windows\system32\NOTEPAD.EXE C:\Users\Admin\AppData\Local\Temp\public\steambootstrapper_ukrainian.txt
    1⤵
    • Opens file in notepad (likely ransom note)
    PID:4424

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads