General
-
Target
c1c72f64714b281dd340072b0eece985949752d18c0a754648a76e29249fc672
-
Size
23KB
-
Sample
240419-wxts4abg34
-
MD5
0345c8bcf2b3ca5b92daae42bf464cb7
-
SHA1
e7855542066360a2e43d91d6e1a5dc9be770918a
-
SHA256
c1c72f64714b281dd340072b0eece985949752d18c0a754648a76e29249fc672
-
SHA512
45014da0a7baef05c63377b7dafb7b1a850cd67718364f2c7c29cbec98ec433f33f558e1996a11e86a96264ca795b6521c82dea2a967b477eec3469ee9256a46
-
SSDEEP
384:pmZBtOLGxm9UG9gUKXiOmvs7fiDygTZ+Go3uwmm8LeeDCDN+l5mDYKEDzUU:pfFm1y1v+q+PewNe4IDKEsU
Behavioral task
behavioral1
Sample
f6b60839de0ac933f0788bc1e12dee859950010f938a05544ad51c424954b9a6.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f6b60839de0ac933f0788bc1e12dee859950010f938a05544ad51c424954b9a6.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\readme-warning.txt
makop
Targets
-
-
Target
f6b60839de0ac933f0788bc1e12dee859950010f938a05544ad51c424954b9a6
-
Size
36KB
-
MD5
d62a9ae1380402cc467cced405ba4aa0
-
SHA1
dd8b78ffe6fafb29ab8e4422e5e7f3429150c8c3
-
SHA256
f6b60839de0ac933f0788bc1e12dee859950010f938a05544ad51c424954b9a6
-
SHA512
2fe310be21c4e210956f9f0ebbeea2783a84e512292614af6c548701c41e559d9bec82c2f0cd2e08e52ef7d1cb1656449e1c96c9438ea3aeda0f5cf312713688
-
SSDEEP
768:nHO6+QwxSRYG1lcjR4Q+aKj+XzMogluDAnMNJxKMO:n5+QXSG1SjRryo5AnIJxK5
Score10/10-
Renames multiple (8260) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Indicator Removal
3File Deletion
3Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1