General
-
Target
0e60d49a967599fab179f8c885d91db25016be996d66a4e00cbb197e5085efa4
-
Size
255KB
-
Sample
240215-f5nztaae47
-
MD5
1933fed76a030529b141d032c0620117
-
SHA1
c55c60a23f5110e0b45fc02a09c4a64d3094809a
-
SHA256
0e60d49a967599fab179f8c885d91db25016be996d66a4e00cbb197e5085efa4
-
SHA512
b153383ebd9919ff293896381d89a895c58985eef60f67803a4276026631184f4d85c19e9ea06351efb7230226b18ed9a17b533fb602e10ded518a7bd090dcfe
-
SSDEEP
3072:iBWxT8JtvyAuX3CGun8r8206BretpJwIiymE9xTRVhGT4z106OKclYQO565tgPYs:iBxrKA4CGu8V0tl9zVhM49OxlYQ8fD3
Static task
static1
Behavioral task
behavioral1
Sample
0e60d49a967599fab179f8c885d91db25016be996d66a4e00cbb197e5085efa4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0e60d49a967599fab179f8c885d91db25016be996d66a4e00cbb197e5085efa4.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
C:\Users\Admin\Documents\Readme.1352FF327.txt
http://wkrlpub5k52rjigwxfm6m7ogid55kamgc5azxlq7zjgaopv33tgx2sqd.onion
https://tox.chat/download.html
Targets
-
-
Target
0e60d49a967599fab179f8c885d91db25016be996d66a4e00cbb197e5085efa4
-
Size
255KB
-
MD5
1933fed76a030529b141d032c0620117
-
SHA1
c55c60a23f5110e0b45fc02a09c4a64d3094809a
-
SHA256
0e60d49a967599fab179f8c885d91db25016be996d66a4e00cbb197e5085efa4
-
SHA512
b153383ebd9919ff293896381d89a895c58985eef60f67803a4276026631184f4d85c19e9ea06351efb7230226b18ed9a17b533fb602e10ded518a7bd090dcfe
-
SSDEEP
3072:iBWxT8JtvyAuX3CGun8r8206BretpJwIiymE9xTRVhGT4z106OKclYQO565tgPYs:iBxrKA4CGu8V0tl9zVhM49OxlYQ8fD3
Score10/10-
Renames multiple (135) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-