General
-
Target
0d148218983f96167795e70053b0960d5a501a30b3c45e626e9228af49af2248.zip
-
Size
4.6MB
-
Sample
240418-wgm1lsbh9z
-
MD5
30686aacaad7be4fbba49d5f6ac34b88
-
SHA1
fcf1ee0542293be4c5a2649c1802b4bde64a0d96
-
SHA256
0c4864599b52de471326f4f5e7a2096ee1820bb3411b0c43ecd1bae389d1ad5d
-
SHA512
188ef4c937447c0a230bfc3e0538c2a7630e020c8f4fbc6c6902cbc7af3d7f35d917d9884e62423b80d7ec241ad99615ad3d23669db1b0b894cb3af3c46d9e5e
-
SSDEEP
98304:8YHzhleY+9RCvfTolwHGivpU/HgZE7bq6alyfJsrMUBxcPOAodU:9H7ArCvLolAh4mKfqrVLcGXU
Behavioral task
behavioral1
Sample
0d148218983f96167795e70053b0960d5a501a30b3c45e626e9228af49af2248.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
C:\Program Files\7-Zip\Lang\ÊÀÊ ÐÀÑØÈÔÐÎÂÀÒÜ ÔÀÉËÛ.txt
https://kay-software.ru
Targets
-
-
Target
0d148218983f96167795e70053b0960d5a501a30b3c45e626e9228af49af2248.exe
-
Size
4.7MB
-
MD5
1df3028b6a1e41a393bb542df2274145
-
SHA1
332899d8f3e304a4447bc7256bbc127c34303291
-
SHA256
0d148218983f96167795e70053b0960d5a501a30b3c45e626e9228af49af2248
-
SHA512
a73115bb838839a1a0a2e4033265422e37eba53cbd295277f5139a1a223bbd2cc3381355069269943f82f834cb6eeec36c5b41c7ab98fa89b9fce03903003308
-
SSDEEP
98304:jbxXg98fQNhyC+Dt1RA9hgpG3qhWXLpSwlzf9UT7fJ/sBo4:jp1fQNhN0EgpTWXLpS8ZGx/sBo4
Score10/10-
Detected Xorist Ransomware
-
Renames multiple (6483) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops file in Drivers directory
-
Manipulates Digital Signatures
Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.
-
Drops startup file
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-