General
-
Target
FMLN Ransomware.exe
-
Size
258KB
-
Sample
240414-2datrsfe45
-
MD5
c87988e35ec34779191f42b6213fdec1
-
SHA1
81036dcf6ea331243f2d512b8ac9611a95a18ea1
-
SHA256
96f3ce153153f922fb18e4722b0348aee2c76022bcdee75fadab97023003fe10
-
SHA512
ba32f9bc18fb187fa4dc03bb1db903255c16af62dc903521ddd8fb120e5599bbccb4fa12255f0195a5e51b6a99ee5228bc0515f299c0ebb1b1a5134e61aab9e4
-
SSDEEP
6144:sBlkZvaF4NTBjWXXn0tHeKMSF0o91TPoEQo:soSWNTRsOBMSF31TgW
Static task
static1
Behavioral task
behavioral1
Sample
FMLN Ransomware.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
FMLN Ransomware.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
FMLN Ransomware.exe
-
Size
258KB
-
MD5
c87988e35ec34779191f42b6213fdec1
-
SHA1
81036dcf6ea331243f2d512b8ac9611a95a18ea1
-
SHA256
96f3ce153153f922fb18e4722b0348aee2c76022bcdee75fadab97023003fe10
-
SHA512
ba32f9bc18fb187fa4dc03bb1db903255c16af62dc903521ddd8fb120e5599bbccb4fa12255f0195a5e51b6a99ee5228bc0515f299c0ebb1b1a5134e61aab9e4
-
SSDEEP
6144:sBlkZvaF4NTBjWXXn0tHeKMSF0o91TPoEQo:soSWNTRsOBMSF31TgW
Score10/10-
BadRabbit
Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.
-
mimikatz is an open source tool to dump credentials on Windows
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Sets desktop wallpaper using registry
-