General
-
Target
0a1dbcff63619c4d9072484bb17b3d06300504e836e42df98eadf57e7ad0d0be
-
Size
225KB
-
Sample
240401-d17v1scd5z
-
MD5
8691dae21568faaeda49bcd640e1ad23
-
SHA1
524b589ef403ff21cf040ef33c21b1d6d8235feb
-
SHA256
0a1dbcff63619c4d9072484bb17b3d06300504e836e42df98eadf57e7ad0d0be
-
SHA512
870aedf4a6ee62cbfdc4c094ddf3da08fb603dc248e36baa9ae833b5f22e930650f97b7d1d1a78787c5ae40e03d131b1814ca34a7264cc9b311cb92f2f1eb30d
-
SSDEEP
6144:2NRgzJmXrQwAPj5XJkcXV50DErs5xgTw7ozFz254W:URglerQwAjkzDZGcoxfW
Behavioral task
behavioral1
Sample
0a1dbcff63619c4d9072484bb17b3d06300504e836e42df98eadf57e7ad0d0be.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0a1dbcff63619c4d9072484bb17b3d06300504e836e42df98eadf57e7ad0d0be.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\31866906861972527219.hta
Targets
-
-
Target
0a1dbcff63619c4d9072484bb17b3d06300504e836e42df98eadf57e7ad0d0be
-
Size
225KB
-
MD5
8691dae21568faaeda49bcd640e1ad23
-
SHA1
524b589ef403ff21cf040ef33c21b1d6d8235feb
-
SHA256
0a1dbcff63619c4d9072484bb17b3d06300504e836e42df98eadf57e7ad0d0be
-
SHA512
870aedf4a6ee62cbfdc4c094ddf3da08fb603dc248e36baa9ae833b5f22e930650f97b7d1d1a78787c5ae40e03d131b1814ca34a7264cc9b311cb92f2f1eb30d
-
SSDEEP
6144:2NRgzJmXrQwAPj5XJkcXV50DErs5xgTw7ozFz254W:URglerQwAjkzDZGcoxfW
Score10/10-
Venus Ransomware
-
Modifies boot configuration data using bcdedit
-
Renames multiple (8640) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-