General
-
Target
d0dd0f7658b938f9a3036ce308f5018ae0cf3bc516aaf3c18b947afee136c043
-
Size
42KB
-
Sample
240317-plndlsec62
-
MD5
8d809510a9ae7b8ef6fc6a25e5feaa22
-
SHA1
eb0888326adbbbdf1537a965c4d26c71549d43f6
-
SHA256
d0dd0f7658b938f9a3036ce308f5018ae0cf3bc516aaf3c18b947afee136c043
-
SHA512
a9ed43be1285f73fda873ee0e39070d4cb3b4b5bd1e69b1506a42f4827f22d0d2f0ad2d25f204ea288f97f6eef787bf0133d0b3659bb8e815f55ff74210e557c
-
SSDEEP
768:PO1oR/UVS1RzK4wbs+D/SIJX+ZZ1SQQwZuIOPzDRufTwsylLO/Ov:PoS1FKnDtkuImTlLOe
Behavioral task
behavioral1
Sample
d0dd0f7658b938f9a3036ce308f5018ae0cf3bc516aaf3c18b947afee136c043.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d0dd0f7658b938f9a3036ce308f5018ae0cf3bc516aaf3c18b947afee136c043.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\+README-WARNING+.txt
Targets
-
-
Target
d0dd0f7658b938f9a3036ce308f5018ae0cf3bc516aaf3c18b947afee136c043
-
Size
42KB
-
MD5
8d809510a9ae7b8ef6fc6a25e5feaa22
-
SHA1
eb0888326adbbbdf1537a965c4d26c71549d43f6
-
SHA256
d0dd0f7658b938f9a3036ce308f5018ae0cf3bc516aaf3c18b947afee136c043
-
SHA512
a9ed43be1285f73fda873ee0e39070d4cb3b4b5bd1e69b1506a42f4827f22d0d2f0ad2d25f204ea288f97f6eef787bf0133d0b3659bb8e815f55ff74210e557c
-
SSDEEP
768:PO1oR/UVS1RzK4wbs+D/SIJX+ZZ1SQQwZuIOPzDRufTwsylLO/Ov:PoS1FKnDtkuImTlLOe
Score10/10-
Renames multiple (8275) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-