General
-
Target
FMLN Ransomware.exe
-
Size
258KB
-
Sample
240425-zz17qsfa24
-
MD5
c87988e35ec34779191f42b6213fdec1
-
SHA1
81036dcf6ea331243f2d512b8ac9611a95a18ea1
-
SHA256
96f3ce153153f922fb18e4722b0348aee2c76022bcdee75fadab97023003fe10
-
SHA512
ba32f9bc18fb187fa4dc03bb1db903255c16af62dc903521ddd8fb120e5599bbccb4fa12255f0195a5e51b6a99ee5228bc0515f299c0ebb1b1a5134e61aab9e4
-
SSDEEP
6144:sBlkZvaF4NTBjWXXn0tHeKMSF0o91TPoEQo:soSWNTRsOBMSF31TgW
Static task
static1
Behavioral task
behavioral1
Sample
FMLN Ransomware.exe
Resource
win7-20240221-es
Behavioral task
behavioral2
Sample
FMLN Ransomware.exe
Resource
win10v2004-20240412-es
Malware Config
Extracted
C:\Users\Admin\Desktop\@Please_Read_Me@.txt
wannacry
115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn
Targets
-
-
Target
FMLN Ransomware.exe
-
Size
258KB
-
MD5
c87988e35ec34779191f42b6213fdec1
-
SHA1
81036dcf6ea331243f2d512b8ac9611a95a18ea1
-
SHA256
96f3ce153153f922fb18e4722b0348aee2c76022bcdee75fadab97023003fe10
-
SHA512
ba32f9bc18fb187fa4dc03bb1db903255c16af62dc903521ddd8fb120e5599bbccb4fa12255f0195a5e51b6a99ee5228bc0515f299c0ebb1b1a5134e61aab9e4
-
SSDEEP
6144:sBlkZvaF4NTBjWXXn0tHeKMSF0o91TPoEQo:soSWNTRsOBMSF31TgW
Score10/10-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Indicator Removal
1File Deletion
1File and Directory Permissions Modification
1Modify Registry
3Hide Artifacts
1Hidden Files and Directories
1