General
-
Target
e22b5ecbdbe9443e99e242c63163ba60cf46b67582a2c07999f2f06a450d77f3
-
Size
68KB
-
Sample
240417-rcsm3scd61
-
MD5
8eed515ccd6606151cf9fd828ec60728
-
SHA1
4ff1c96a4cbc1d8b6ee790176ed2c11c151cf41a
-
SHA256
e22b5ecbdbe9443e99e242c63163ba60cf46b67582a2c07999f2f06a450d77f3
-
SHA512
8bf35c00b4a23a118e1f49d12e11fc5e1f229b16c4e652190792f58aca1b08f0fdd8b453c6fb9b291c1be4090823ba0bce29dbfbdaf9370645a9c42c508fa24a
-
SSDEEP
1536:FeXApyrxqK0QdmQws8EoohLv8TCk/KDUY9+0AY2cx8m6k:U1xqpWmQF8Roxv8B/KDJ9+0dP8K
Static task
static1
Behavioral task
behavioral1
Sample
226a723ffb4a91d9950a8b266167c5b354ab0db1dc225578494917fe53867ef2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
226a723ffb4a91d9950a8b266167c5b354ab0db1dc225578494917fe53867ef2.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\RecoveryManual.html
href="mailto:[email protected]">[email protected]</a><br>
Extracted
C:\Program Files\RecoveryManual.html
href="mailto:[email protected]">[email protected]</a><br>
Targets
-
-
Target
226a723ffb4a91d9950a8b266167c5b354ab0db1dc225578494917fe53867ef2.exe
-
Size
200KB
-
MD5
c2671bf5b5dedbfd3cfe3f0f944fbe01
-
SHA1
da3e830011e6f9d41dd6c93fdb48c47c1c6e35e1
-
SHA256
226a723ffb4a91d9950a8b266167c5b354ab0db1dc225578494917fe53867ef2
-
SHA512
256bc8582cc9b53b3cf9307a2882117476648ab9df540d501fc5f46a4030beacab9df2019f2d83b0a63d510803cbf6cbae01dc1325588f93a1a74521a07fe4d9
-
SSDEEP
1536:ssBoz9GFuIdclwKfVPoawSL20mRbg2DrE1mHkrY0f3r6fR0ZzDWR+3itGSh6ZVvg:ssS3oifBoaXhDWA4G3eeJaeIbmC00
Score10/10-
MountLocker Ransomware
Ransomware family first seen in late 2020, which threatens to leak files if ransom is not paid.
-
Deletes itself
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-