General
-
Target
2024-05-16_fb953d1eaea934f718afb7de43b6a91f_crysis_dharma
-
Size
92KB
-
Sample
240516-2fbtvabg75
-
MD5
fb953d1eaea934f718afb7de43b6a91f
-
SHA1
f30ac814ef19e45119ecff2e64256d3c1b7d1864
-
SHA256
df7fe80d2ea970965f5eadcba3b981391f969fbd98a804f4ac3364a57a237cf4
-
SHA512
8c1d6b7e579e84530dcac95b63f07c84c647d531a0f3bdf2646957537f4fda7a5f3d5f01b91fc1f86370ebfe1c7bb4d54e8ee023197264096ca05485609b9dc6
-
SSDEEP
1536:mBwl+KXpsqN5vlwWYyhY9S4AsFjrC+wIVwcbTO8SapkbAnkTfKYk1xZqx60Fm8:Qw+asqN5aW/hLsCQCc5vkjKxCx60Fr
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-16_fb953d1eaea934f718afb7de43b6a91f_crysis_dharma.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-16_fb953d1eaea934f718afb7de43b6a91f_crysis_dharma.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
Targets
-
-
Target
2024-05-16_fb953d1eaea934f718afb7de43b6a91f_crysis_dharma
-
Size
92KB
-
MD5
fb953d1eaea934f718afb7de43b6a91f
-
SHA1
f30ac814ef19e45119ecff2e64256d3c1b7d1864
-
SHA256
df7fe80d2ea970965f5eadcba3b981391f969fbd98a804f4ac3364a57a237cf4
-
SHA512
8c1d6b7e579e84530dcac95b63f07c84c647d531a0f3bdf2646957537f4fda7a5f3d5f01b91fc1f86370ebfe1c7bb4d54e8ee023197264096ca05485609b9dc6
-
SSDEEP
1536:mBwl+KXpsqN5vlwWYyhY9S4AsFjrC+wIVwcbTO8SapkbAnkTfKYk1xZqx60Fm8:Qw+asqN5aW/hLsCQCc5vkjKxCx60Fr
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (322) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-