General
-
Target
7f64cb7e7ebfefa6d1376bcfc5b2a8fdded19aff482f3cdb766f27923a5a3bbc
-
Size
6KB
-
Sample
240419-wy9kyabh23
-
MD5
ad69026f0cf984eaef62389e9b8ab266
-
SHA1
29d3d01ce6827de4298c7bea23acd2b74053991d
-
SHA256
7f64cb7e7ebfefa6d1376bcfc5b2a8fdded19aff482f3cdb766f27923a5a3bbc
-
SHA512
945e5facf42341344ae1aeadc907da389742b0064fcad490920a9335dce79468166daa2574769d547277a98c4b73a1a59ee8e3f0a2eaaa5ca5f877cb98881e24
-
SSDEEP
192:3rSTs/1W2RH1wTV6uQcMGEVnqx41r4940nmqVTIv:3z/1W2sB1Qcz6nqx4J0mKK
Behavioral task
behavioral1
Sample
319fbb2dd26045a90a452eb26799c6529f8a77ad8d7b967aec58111e25b12cd5.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
319fbb2dd26045a90a452eb26799c6529f8a77ad8d7b967aec58111e25b12cd5.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\HOW TO DECRYPT FILES.txt
37t6hwuzJbq6PtEgaxyS3AWyLS99qMGrt8
Targets
-
-
Target
319fbb2dd26045a90a452eb26799c6529f8a77ad8d7b967aec58111e25b12cd5
-
Size
12KB
-
MD5
0a5e38ff165e9e78e58fd5b47b19b86a
-
SHA1
d0cccb38776b7390bf8b0fc5ebe14a75b1dfa3ef
-
SHA256
319fbb2dd26045a90a452eb26799c6529f8a77ad8d7b967aec58111e25b12cd5
-
SHA512
330c946e02bab30f4f33a6b246c0ad3d83438dddd1572d499aca2af5a1789714b81ba08729c2917ad8b6090ccb2b476d3a88f6bfd537ebd5a2f0e8ff9048ab67
-
SSDEEP
192:K/TrG62a6B10k3g4fXk1iTV3HGc7EkpAqEjvu2q9C/YpXnAITZfPtRMTrE4l2W:KebFNw4Pk1itKkpAjjI2YpdmToQ2W
Score10/10-
Renames multiple (2190) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops file in Drivers directory
-
Drops startup file
-
Adds Run key to start application
-
Drops file in System32 directory
-