Resubmissions
11-03-2024 08:37
240311-kjdn6sfg5y 10Analysis
-
max time kernel
137s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11-03-2024 08:37
Behavioral task
behavioral1
Sample
BoostTool.rar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
BoostTool.rar
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
BoostTool/BoostTool.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
BoostTool/BoostTool.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Creal.pyc
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Creal.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
BoostTool/READMIN.txt
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
BoostTool/READMIN.txt
Resource
win10v2004-20240226-en
General
-
Target
BoostTool/READMIN.txt
-
Size
643B
-
MD5
5191f5801f27ebd3bbd2d3adc4cd2e36
-
SHA1
ea69e921137dd05a4dd74905ecd674f4b9568723
-
SHA256
ca8229264b9c02963a29d0d9dfadb4eb7def2469c2cafb89e51e38400c825b10
-
SHA512
48433f3b1ace4178ff64f5fffe8b1df56830d348c72157986c6f18babe8385838f4f26c65b3302c0cd64802ac1da802e19c5dd6e74c264405ee66a7cdfd5686a
Malware Config
Signatures
-
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2104 NOTEPAD.EXE