Overview
overview
10Static
static
103da65a0e61...0e.exe
windows7-x64
103da65a0e61...0e.exe
windows10-2004-x64
10Ransomware...et.exe
windows7-x64
8Ransomware...et.exe
windows10-2004-x64
8Ransomware...er.exe
windows7-x64
1Ransomware...er.exe
windows10-2004-x64
1Ransomware/Cerber.exe
windows7-x64
10Ransomware/Cerber.exe
windows10-2004-x64
10Ransomware...ks.exe
windows7-x64
1Ransomware...ks.exe
windows10-2004-x64
1Ransomware...ER.exe
windows7-x64
10Ransomware...ER.exe
windows10-2004-x64
10Ransomware...er.exe
windows7-x64
9Ransomware...er.exe
windows10-2004-x64
8Ransomware...ey.exe
windows7-x64
10Ransomware...ey.exe
windows10-2004-x64
10Ransomware/Locky.exe
windows7-x64
10Ransomware/Locky.exe
windows10-2004-x64
10Ransomware/Matsnu.exe
windows7-x64
7Ransomware/Matsnu.exe
windows10-2004-x64
3Ransomware/Rex
ubuntu-18.04-amd64
9Ransomware...er.exe
windows7-x64
1Ransomware...er.exe
windows10-2004-x64
1Ransomware...92.exe
windows7-x64
9Ransomware...92.exe
windows10-2004-x64
9Ransomware...ll.exe
windows7-x64
9Ransomware...ll.exe
windows10-2004-x64
3Ransomware/eda2.exe
windows7-x64
1Ransomware/eda2.exe
windows10-2004-x64
1Ransomware/jigsaw.exe
windows7-x64
10Ransomware/jigsaw.exe
windows10-2004-x64
10Ransomware/mamba.exe
windows7-x64
1General
-
Target
Ransomware.zip
-
Size
15.7MB
-
Sample
240302-y31jyahe32
-
MD5
db5767904e1067a3ab570f60300e10ef
-
SHA1
09be1da25133fbf0527b6034b7626cbcc8fc7c69
-
SHA256
c2bf26d1b3a311be1bec839ca7c26bf2c944fd79333485a271230ec435c318dd
-
SHA512
fee1c72f97302642d5d57c174e871ed3a55e2cb1d71d6d8304bc5676a4e7d770fe66730d8687d32815a44473b1e9030b09c6ba7d54d77adecba53c27385d4f74
-
SSDEEP
393216:OQm4g9/2UsB+tKQTdnhxN/+FIUScHbJAB6o1EljZBh2Hjj6eVu98D9:Rg9/uOTfx4aSbJRoOBh2n/
Behavioral task
behavioral1
Sample
3da65a0e613fadcff41992bd4f74b7dc1e71f9cb542339679185f79de6503f0e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3da65a0e613fadcff41992bd4f74b7dc1e71f9cb542339679185f79de6503f0e.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Ransomware/Alphabet.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Ransomware/Alphabet.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Ransomware/Atom Payload Builder.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Ransomware/Atom Payload Builder.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
Ransomware/Cerber.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Ransomware/Cerber.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
Ransomware/EternalRocks.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Ransomware/EternalRocks.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
Ransomware/GLOBEIMPOSTER.exe
Resource
win7-20240215-en
Behavioral task
behavioral12
Sample
Ransomware/GLOBEIMPOSTER.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
Ransomware/GhostCrypter.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Ransomware/GhostCrypter.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
Ransomware/Golden Eyes - via unikey.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
Ransomware/Golden Eyes - via unikey.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
Ransomware/Locky.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
Ransomware/Locky.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
Ransomware/Matsnu.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
Ransomware/Matsnu.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
Ransomware/Rex
Resource
ubuntu1804-amd64-20240226-en
Behavioral task
behavioral22
Sample
Ransomware/ShellLocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral23
Sample
Ransomware/ShellLocker.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral24
Sample
Ransomware/Unlock92.exe
Resource
win7-20240221-en
Behavioral task
behavioral25
Sample
Ransomware/Unlock92.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral26
Sample
Ransomware/cryptowall.exe
Resource
win7-20240221-en
Behavioral task
behavioral27
Sample
Ransomware/cryptowall.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral28
Sample
Ransomware/eda2.exe
Resource
win7-20240221-en
Behavioral task
behavioral29
Sample
Ransomware/eda2.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral30
Sample
Ransomware/jigsaw.exe
Resource
win7-20240220-en
Behavioral task
behavioral31
Sample
Ransomware/jigsaw.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral32
Sample
Ransomware/mamba.exe
Resource
win7-20240215-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\HOW TO DECRYPT FILES.txt
1Hxq9SJobRG8xZc2h4hN9xaaga2jFBiYqQ
Extracted
C:\Users\Public\Videos\how_to_back_files.html
class="mark">[email protected]</span>
Extracted
C:\Users\Public\Videos\how_to_back_files.html
class="mark">[email protected]</span>
Extracted
metasploit
windows/single_exec
Extracted
C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___9LOCG7_.txt
cerber
http://p27dokhpz2n7nvgr.onion/050A-1F36-E42F-0446-924A
http://p27dokhpz2n7nvgr.14ewqv.top/050A-1F36-E42F-0446-924A
http://p27dokhpz2n7nvgr.14vvrc.top/050A-1F36-E42F-0446-924A
http://p27dokhpz2n7nvgr.129p1t.top/050A-1F36-E42F-0446-924A
http://p27dokhpz2n7nvgr.1apgrn.top/050A-1F36-E42F-0446-924A
http://p27dokhpz2n7nvgr.1p5fwl.top/050A-1F36-E42F-0446-924A
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_R_E_A_D___T_H_I_S___W9RV9_.hta
cerber
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_R_E_A_D___T_H_I_S___AQS7ZWR2_.txt
cerber
http://p27dokhpz2n7nvgr.onion/7B26-1391-7BB0-0446-9133
http://p27dokhpz2n7nvgr.14ewqv.top/7B26-1391-7BB0-0446-9133
http://p27dokhpz2n7nvgr.14vvrc.top/7B26-1391-7BB0-0446-9133
http://p27dokhpz2n7nvgr.129p1t.top/7B26-1391-7BB0-0446-9133
http://p27dokhpz2n7nvgr.1apgrn.top/7B26-1391-7BB0-0446-9133
http://p27dokhpz2n7nvgr.1p5fwl.top/7B26-1391-7BB0-0446-9133
Targets
-
-
Target
3da65a0e613fadcff41992bd4f74b7dc1e71f9cb542339679185f79de6503f0e.bin
-
Size
72KB
-
MD5
c12a9eae7b63f5bdd90deb3969079492
-
SHA1
f0700457e66091be7222748c7170881608d3a0cd
-
SHA256
3da65a0e613fadcff41992bd4f74b7dc1e71f9cb542339679185f79de6503f0e
-
SHA512
44270af6f6fed42dcb190f0761714bdc1a4888197f3d19f1c6c1d694138e54b17ec9403ff24658ee6a9e7379fceaae1e727ccefe512b26818e2310669fbeabc9
-
SSDEEP
1536:1ODavnxrn1hV6tXqHa0Fyp7Sz4C4OKqlmAC+YyWd4AEZswQUI5GLy:AoV6puaMypmMTOK/41krQ+
Score10/10-
Renames multiple (6123) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops file in Drivers directory
-
Modifies Installed Components in the registry
-
Drops startup file
-
Adds Run key to start application
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
-
-
Target
Ransomware/Alphabet.bin
-
Size
168KB
-
MD5
dbe78231174b03239eb262cc2d2d0900
-
SHA1
fc472223cd9aee3cf912fc401bd47774569d07ac
-
SHA256
4e60f3c8eaa0441d4ffdced18aa04153bb91b5470bc5441ba5878f7760ca9b5b
-
SHA512
27561377d217c449e4730a0eab69cd1edd68480ea22e6b3c8fee0e76603acc36cbc420c204b3ecf98f0dde4cf731cad6937751c780c796c7192a84ad1823d2ba
-
SSDEEP
1536:rBUzOE+2x+/m2x+kDgJF+2x+/m2x+kDgWGekNsGekNFuJGekNsGekNcl:wOE1+l+kcJF1+l+kctphpG
Score8/10-
Modifies Installed Components in the registry
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
-
-
Target
Ransomware/Atom Payload Builder.exe
-
Size
513KB
-
MD5
224db51b372a5a26f3e09d2a64af50b2
-
SHA1
bca07e1a05bc30bbf51ccfdc34676fc574b790d7
-
SHA256
5ab04878b630d1e0598fb6f74570f653a6bd0753dad9ef55ecf467bee7e618e1
-
SHA512
f031ee3a4307bddffcf9809f3e4d778a5f8ebe1d53ba8fde13bd1c6248e93e8e479ddb21dca9a201aaa261c4111eee2c21a241fbe3087f9eb777bccc542163de
-
SSDEEP
12288:amhp5zFkcxdQ8r0R3gYR3nxdJYEm5ATgulc/:3BZoR3gYR3nFmBulc
Score1/10 -
-
-
Target
Ransomware/Cerber
-
Size
492KB
-
MD5
8b3d0bc69064a0155a205a4202417330
-
SHA1
0aa06a222900a2d3042e73fc21b52004d7856aeb
-
SHA256
9ef7fe10bbbb58899859d82ba7a698cbfdd546c6e9e4d3b55193e4180682036c
-
SHA512
e54140bdf79b5498cb7f4a519a4d9ed54e3a4845ae822a2f25c3f1d97b616b9f1374ece7ff788e0e667e5ac5824f81aa1a1861b8d212e832533590ac1f96633a
-
SSDEEP
12288:ww+dKNr2YH7WQx3IjKoa+888888888888W888888888888:wVKMYbWzuBf
Score10/10-
Blocklisted process makes network request
-
Contacts a large (1094) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
-
-
Target
Ransomware/EternalRocks
-
Size
5.0MB
-
MD5
53f23e72664dc9efd4251ba1b120d932
-
SHA1
5e033b70775429fb6a5c2f40435984526f3a4ca1
-
SHA256
3b4497c7f8c89bf22c984854ac7603573a53b95ed147e80c0f19e549e2b65693
-
SHA512
fad16aeff2bc7ff24eba061167769d40ef228fc986c3a6ca3cabb5e42625bd22a7a9745cabe551b089d8361305f92bc1786b40e2f00d185a9e524e0935f867f5
-
SSDEEP
98304:SX/pvSmTsOmMpu5l/sB0seyAp/QszFjXEKZFbr0vKPMKznq:EBvpsOmX5ly0sbAtVXEKZF+sVq
Score1/10 -
-
-
Target
Ransomware/GLOBEIMPOSTER
-
Size
232KB
-
MD5
1bbd2dc9746292c60121865663b287f2
-
SHA1
04644335ef7523274146a4f39ab30621c2a2a9a1
-
SHA256
2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234
-
SHA512
da557f37abac2300ee03e4167d1dbf9d06d7f6faa6af887fb0966de4c3c7d35117f8ca0cee6e5d68d9ba091ab9464eb1a4b601a759c3b860b141afc346a0da66
-
SSDEEP
6144:6pSie0JHvaS7MTqp4Re4jjMXn3lNv8en:6pUSPaSkqp4RtMlhh
Score10/10-
Renames multiple (8643) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-
-
-
Target
Ransomware/GhostCrypter.bin
-
Size
87KB
-
MD5
d60b0083605a9fb10b4d21005f1febd0
-
SHA1
ed538f9dc4a7b58649d55b892e4a32cfb25b98a1
-
SHA256
eae568e1a06b6dd762c92a8e0be5349c0c474ff429785fdad7d58083a10485de
-
SHA512
4c8b4e93685852cc4634f2cc2bd66ff86b2e133b9f6899441488b630569c26832eab07b08ced87b62031749969bb9c0d2e1fd229071213ed71eeaa9f27fb87cb
-
SSDEEP
1536:NcMqI3TJ38pY5GuncfTpgg5qKB3gg5bwFlG3zg4llJLmA+pVStv:Nck3TJ38pY5OfTpTpggSHGblzL8S
Score9/10-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Drops file in System32 directory
-
-
-
Target
Ransomware/Golden Eyes - via unikey.exe
-
Size
1.3MB
-
MD5
3f6bfaa577b7be13705f41cc5b6cb1eb
-
SHA1
0a9cd77276ac62848eeb1c428cf9f05c0e0ec69c
-
SHA256
21780731ba0394eaa38254960f445321f2ca10450623855d8e2f1d6e30481022
-
SHA512
9f02e7fc31f7fe3ebebebc4b38f49cd885f91b5bc3ee0b7c0cb2f19f2e8f983aebf671197471b61f624dbc13183bac66f8c19d50fb3a501c269ea3d1a9029ce1
-
SSDEEP
24576:/7blFG2wAhxKw0cDJ/ztH6NtCsL96AEwZIOd++kD4mRkdqbhm:/75o2FfKwT1/x2btFtsTD4mRkdqbhm
-
Detect Neshta payload
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
-
-
Target
Ransomware/Locky
-
Size
180KB
-
MD5
b06d9dd17c69ed2ae75d9e40b2631b42
-
SHA1
b606aaa402bfe4a15ef80165e964d384f25564e4
-
SHA256
bc98c8b22461a2c2631b2feec399208fdc4ecd1cd2229066c2f385caa958daa3
-
SHA512
8e54aca4feb51611142c1f2bf303200113604013c2603eea22d72d00297cb1cb40a2ef11f5129989cd14f90e495db79bffd15bd6282ff564c4af7975b1610c1c
-
SSDEEP
3072:gzWgfLlUc7CIJ1tkZaQyjhOosc8MKi6KDXnLCtyAR0u1cZ86:gdLl4wkZa/UDiD7ukst1H6
Score10/10 -
-
-
Target
Ransomware/Matsnu.com_
-
Size
102KB
-
MD5
1b2d2a4b97c7c2727d571bbf9376f54f
-
SHA1
1fc29938ec5c209ba900247d2919069b320d33b0
-
SHA256
7634433f8fcf4d13fb46d680802e48eeb160e0f51e228cae058436845976381e
-
SHA512
506fc96423e5e2e38078806591e09a6eb3cf924eb748af528f7315aa0b929890823798a3ef2a5809c14023c3ff8a3db36277bc90c7b099218422aafa4e0c2ee0
-
SSDEEP
1536:jj+Rj1lGIXKSmE17v97yiqHGMRPtbsLW8/V2k12v1/BDxVyCfCrCAc:jjw6Sf0iqmMnb2W02v3mCf4Nc
Score7/10-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
Ransomware/Rex
-
Size
7.3MB
-
MD5
5bd44a35094fe6f7794d895122ddfa62
-
SHA1
98172e49c3d5d70ffdcefd071f9762c58430a393
-
SHA256
762a4f2bf5ea4ff72fce674da1adf29f0b9357be18de4cd992d79198c56bb514
-
SHA512
4033c7335a44a7536a3980aad8cf18ff6336186d71dd7b7f02c3d5c93001ed974285fe9fbbf783bc0abac3e3b3581993ad6d2ac285249aa24b0aafa261f74de8
-
SSDEEP
49152:mNLLdMtTbVDtCsN5laK2BfCDvI7ZR9kAs5dkPjU2NhYCWpdLJaDSfUGZnh7X3cM9:mNlMt1tCsN5LGfCL7ATfscS8QhXP
Score9/10-
Contacts a large (11706) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
Ransomware/ShellLocker.exe
-
Size
679KB
-
MD5
5f3a3ee275a03ac1c2fa5482649b6471
-
SHA1
9673a5a87428e3b38e65f2cd922946d47c4a329b
-
SHA256
c9661b2f5274b1835d64e6d58ea5a8ff58ffa8d9d19a9a31bd43f074c6e2eb69
-
SHA512
405139d37c3ec224f96316a59b2764d159d750d480acbbbc77c7bb8f46d9709dbcbea60cfe6d6f500d72e4b23b88ac52951bf13fb34ad81ffde9d5c32b0fb46a
-
SSDEEP
12288:/W3FwqcxVUmAb35S9DLF4YMQ9WhueDFEkSstBZfMUpqv:/W3FwqcxKmgBkW8dstXEUpqv
Score1/10 -
-
-
Target
Ransomware/Unlock92.bin
-
Size
24KB
-
MD5
afe4fa37dbbe91319f0684bc9524e557
-
SHA1
db412ecb113e8f40781105af0d3dbc67760a9461
-
SHA256
639f0ebcb2349caf7ab5f34e0d7c156db660f54f621fa9c2151c9f5795528670
-
SHA512
83d7730a0213c98c4c9d5e8d195eab9c73362824d541df6e68e0106b409be756db4db2317f9ed2796de2e5bb86bdbf9195c0b8c6d91b8986df9ebe58c3603da7
-
SSDEEP
384:TPDGsgnqFmaPJB4hWMhX5fLhMYQJtz0F92nudaTfrnnnwKPjDKcsujYcV6SUwJF9:DDGbQ/8WMN5frVF9qnnfPfZYcV6lw9b
Score9/10-
Renames multiple (661) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Drops file in System32 directory
-
-
-
Target
Ransomware/cryptowall.bin
-
Size
240KB
-
MD5
47363b94cee907e2b8926c1be61150c7
-
SHA1
ca963033b9a285b8cd0044df38146a932c838071
-
SHA256
45317968759d3e37282ceb75149f627d648534c5b4685f6da3966d8f6fca662d
-
SHA512
93dfaafc183360829448887a112dd49c90ec5fe50dcd7c7bbc06c1c8daa206eeea5577f726d906446322c731d0520e93700d5ff9cefd730fba347c72b7325068
-
SSDEEP
3072:xkeyloECBch6ZCGBGSmHJ0y5lj6jdojK7+MGOXpXx8z3Lp7Yoq:xGlnCIwMpj6ijKfxx8z3F0V
Score9/10-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
-
-
Target
Ransomware/eda2.exe
-
Size
208KB
-
MD5
9ed4b9ace2563ce02973e94999e5081e
-
SHA1
7c69fd4f8650370ce07d18436ee4a44185f4f529
-
SHA256
fa2a9561a0cfc535908b8b39168391d4f87c685e8d95f52a51d194cc7264ba37
-
SHA512
6d48b956cbfc2d1a27a89e082bd7f914b5aeac8e00339a961cd1a18bab860185a64bb471f71e69e4bd1cacb801f57df140dffe7fd6b5b007eb2ec4b5540f8031
-
SSDEEP
3072:etRM+lmsolAIrRuw+mqv9j1MWLQ5MTmmsolNIrRuw+mqv9j1MWLQ5:1+lDAArTmDAN
Score1/10 -
-
-
Target
Ransomware/jigsaw
-
Size
283KB
-
MD5
2773e3dc59472296cb0024ba7715a64e
-
SHA1
27d99fbca067f478bb91cdbcb92f13a828b00859
-
SHA256
3ae96f73d805e1d3995253db4d910300d8442ea603737a1428b613061e7f61e7
-
SHA512
6ef530b209f8ec459cca66dbf2c31ec96c5f7d609f17fa3b877d276968032fbc6132ea4a45ed1450fb6c5d730a7c9349bf4481e28befaea6b119ec0ded842262
-
SSDEEP
6144:7fukPLPvucHiQQQ4uuy9ApZbZWxcZt+kTfMLJTOAZiYSXjjeqXus:7fu5cCT7yYlWi8kTfMLJTOAZiYSXjyqX
Score10/10-
Jigsaw Ransomware
Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.
-
Renames multiple (1997) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
Ransomware/mamba.exe
-
Size
2.3MB
-
MD5
409d80bb94645fbc4a1fa61c07806883
-
SHA1
4080bb3a28c2946fd9b72f6b51fe15de74cbb1e1
-
SHA256
2ecc525177ed52c74ddaaacd47ad513450e85c01f2616bf179be5b576164bf63
-
SHA512
a99a2f17d9fbb1da9fb993b976df63afa74317666eca46d1f04e7e6e24149547d1ac7210f673caeae9b23a900528ad6ad0a7b98780eff458d3d505029a06e9ba
-
SSDEEP
49152:XM16E7qUoM5NWX7DP+1egOhcraQzK6j97V:c16/rM5oW1ZrRz
Score1/10 -
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
2File Deletion
2Modify Registry
6Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1