General
-
Target
New Text Document.txt
-
Size
45B
-
Sample
240526-2yphnagb52
-
MD5
23a1a78d0b5351de1748875c282f8496
-
SHA1
ac6bfb0816ab0e6fa0195fce7d3d3fd4362715eb
-
SHA256
b346bd42d2892de01d3d271994d425617e4712c5d08a8637046f1406ab6f1ba1
-
SHA512
46d46751ee80eaa6f12e5ffd410e6687f54354cd23a947597e6a38daf1e67e545d517dc1114cbdc6c5a0d8e6a03beb0c67e2598126a413b8cbb0b7ea4a4c1ca0
Static task
static1
Behavioral task
behavioral1
Sample
New Text Document.txt
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
New Text Document.txt
-
Size
45B
-
MD5
23a1a78d0b5351de1748875c282f8496
-
SHA1
ac6bfb0816ab0e6fa0195fce7d3d3fd4362715eb
-
SHA256
b346bd42d2892de01d3d271994d425617e4712c5d08a8637046f1406ab6f1ba1
-
SHA512
46d46751ee80eaa6f12e5ffd410e6687f54354cd23a947597e6a38daf1e67e545d517dc1114cbdc6c5a0d8e6a03beb0c67e2598126a413b8cbb0b7ea4a4c1ca0
Score10/10-
Renames multiple (96) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-