General
-
Target
loader.exe
-
Size
182KB
-
Sample
240317-wj2a1sce3z
-
MD5
d5c0f4aaeda7fe68e2ecbf1f11760934
-
SHA1
78848153f67e18cecf70dbf514162851949ae13e
-
SHA256
cd914eaa47f3d00baa5f5cdee725baab2f7203403e12b2b624d5b4459254f7d4
-
SHA512
d37e2f23ddbe5b5af04d08a375fcae1677a00a07a3ceb88fb6f85b419da769908d75e8796b994b7bc2e6aa6354135c4678a2c28b6a4060840acd4dd7df9b829e
-
SSDEEP
3072:Rjc+GeTJtZD2j39iF+pEh61cI0UicdjLp/XoXUW6zveOWSNgEP:RTpA39iAl1d09cdpXoXh0eOzgE
Static task
static1
Behavioral task
behavioral1
Sample
loader.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
loader.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
C:\Program Files\7-Zip\Lang\DECRYPT_YOUR_FILES.HTML
Targets
-
-
Target
loader.exe
-
Size
182KB
-
MD5
d5c0f4aaeda7fe68e2ecbf1f11760934
-
SHA1
78848153f67e18cecf70dbf514162851949ae13e
-
SHA256
cd914eaa47f3d00baa5f5cdee725baab2f7203403e12b2b624d5b4459254f7d4
-
SHA512
d37e2f23ddbe5b5af04d08a375fcae1677a00a07a3ceb88fb6f85b419da769908d75e8796b994b7bc2e6aa6354135c4678a2c28b6a4060840acd4dd7df9b829e
-
SSDEEP
3072:Rjc+GeTJtZD2j39iF+pEh61cI0UicdjLp/XoXUW6zveOWSNgEP:RTpA39iAl1d09cdpXoXh0eOzgE
Score10/10-
Renames multiple (4969) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Disables Task Manager via registry modification
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-