Static task
static1
Behavioral task
behavioral1
Sample
2024-02-13_dbec239b23fac8edd7baa72cf59430a6_ragnar-locker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-13_dbec239b23fac8edd7baa72cf59430a6_ragnar-locker.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-13_dbec239b23fac8edd7baa72cf59430a6_ragnar-locker
-
Size
47KB
-
MD5
dbec239b23fac8edd7baa72cf59430a6
-
SHA1
ac50372bcb3162c7bd4cde54461dde9a78f94927
-
SHA256
5e893970e7a424d29bc37de888405a41102a7ab303cb12a55569b5c039763e88
-
SHA512
4e24abe225c71477ec89ebfdb914a81b26cdad3283c78f6ce23fc8a759fc85058af520ae85876e8f2fdfd31224730997e34e6b045743c32f87607ce8633854b3
-
SSDEEP
768:1pC+gIzbC1Roq65coOBjd/3oqab0k3RfnPutCDrI3dfHq4ytZZZL2Y/M:1pCGcRo4zFoqaXN0NfHq4OZZZLlk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-13_dbec239b23fac8edd7baa72cf59430a6_ragnar-locker
Files
-
2024-02-13_dbec239b23fac8edd7baa72cf59430a6_ragnar-locker.exe windows:5 windows x86 arch:x86
9d2251d8fce3459fbac338b0936630c7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpiW
lstrcpyA
lstrcpyW
lstrcatW
lstrlenA
lstrlenW
CreateEventW
LoadLibraryW
GetModuleFileNameW
CreateProcessW
GetStartupInfoW
GetDriveTypeW
GetSystemDirectoryW
GetWindowsDirectoryW
GetNativeSystemInfo
QueryDosDeviceW
CreateFileW
FindFirstFileW
FindNextFileW
CopyFileW
GetVolumeInformationW
GetComputerNameW
WTSGetActiveConsoleSessionId
MultiByteToWideChar
GetLocaleInfoW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetTickCount
CloseHandle
FindClose
ReadFile
SetFilePointerEx
WriteFile
GetFileSizeEx
UnlockFile
LockFile
GetLogicalDrives
Sleep
WaitForSingleObject
GetLastError
TerminateProcess
ExitProcess
GetCurrentProcess
OpenProcess
GetProcessHeap
HeapFree
HeapAlloc
VirtualFree
VirtualAlloc
LocalFree
GetFullPathNameW
GetProcAddress
user32
wsprintfA
wsprintfW
advapi32
CryptGenRandom
CryptReleaseContext
QueryServiceStatusEx
OpenServiceA
OpenSCManagerA
EnumServicesStatusA
EnumDependentServicesA
ControlService
CloseServiceHandle
CryptEncrypt
CryptDestroyKey
CryptAcquireContextW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
DuplicateTokenEx
CreateProcessAsUserW
GetUserNameW
SetTokenInformation
OpenProcessToken
shell32
SHGetSpecialFolderPathW
shlwapi
PathFindFileNameW
StrStrIA
PathFindExtensionW
StrStrW
StrToIntA
crypt32
CryptDecodeObjectEx
CryptStringToBinaryW
CryptBinaryToStringA
CryptImportPublicKeyInfo
psapi
GetProcessImageFileNameW
Sections
.text Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 596B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.keys Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_STRTOK Size: 512B - Virtual size: 144B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 620B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ