General
-
Target
Venom Software v6.zip
-
Size
94KB
-
Sample
240523-v5vjxsaf78
-
MD5
8533fed20b64766a46d12a2154c51449
-
SHA1
f12b6544e3ddb41439bdfcc0ff8422d6372a1276
-
SHA256
e15032dd5c14a1149274faf83ed306ab82fa0d90aa507c982025d4e2d32098c3
-
SHA512
2c5e7adea1067def2a24b12a7d3365b0df558c6c40424d1a0de2d1d585aeffc735b7ae3f39c5454a5a31bf1e6df05f7531a31328d4c2683423137173bbfebfd4
-
SSDEEP
1536:1r0cg/+qa/ml1JvtOHawhwfz+lhq2whbQnpGs7A7fV/0+G/Inskwp4ektWmJFinn:1rlXPml1jOHwzWQwYsM7fs/OlektVFin
Behavioral task
behavioral1
Sample
Venom Software v6/VenomV6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Venom Software v6/VenomV6.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
Venom Software v6/VenomV6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
Venom Software v6/VenomV6.exe
Resource
win11-20240426-en
Malware Config
Extracted
C:\3R9qG8i3Z.README.txt
https://t.me/mr_robot_unlock
Extracted
C:\3R9qG8i3Z.README.txt
https://t.me/mr_robot_unlock
Extracted
C:\3R9qG8i3Z.README.txt
https://t.me/mr_robot_unlock
Extracted
C:\3R9qG8i3Z.README.txt
https://t.me/mr_robot_unlock
Targets
-
-
Target
Venom Software v6/VenomV6.exe
-
Size
146KB
-
MD5
3d49478072bf18339ef810c8ea7546b2
-
SHA1
c1047d72d4cdce21af4bb989ad1bee437edb7f80
-
SHA256
e3300e30997c5a355f02ca6972711b2ca843d00a393b62c75818a43c27ff128d
-
SHA512
f47f6a1c51b92cc34a1dc264bc2b151690f1c314c5f97b08530e9efd6929c860985f9410f411cb31e0f3acd75b8969e4791ca9fb080901f6f4cb70322255a91c
-
SSDEEP
3072:A6glyuxE4GsUPnliByocWepU0DxwbL2LUnPaZw:A6gDBGpvEByocWeTDxOL2LScw
Score10/10-
Renames multiple (324) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-