General
-
Target
21611a8c76169a345715cf0d6dbf9e495e71ad235ed11bca5ee38ec281f75fc2
-
Size
241KB
-
Sample
240529-k5z5ashf8z
-
MD5
5bb957a511d230c271fae129f48f1fdf
-
SHA1
a72f01cf027c7e385bbfc2488c91db14dadc9fac
-
SHA256
21611a8c76169a345715cf0d6dbf9e495e71ad235ed11bca5ee38ec281f75fc2
-
SHA512
5f815534114d0099cd28a5f732d0c6fca59ce535e1b55a42b99d22ca9ebcc921d9430bed9a36e723035326716d8b6f8872f748ed075305a1d4b1933eec92ee23
-
SSDEEP
6144:fyGt4iW5Mpj4tZx80FYuiHAZ2CLR+D7XnrlAPgT7:f94o4XRFYsZbt+D7nhj
Static task
static1
Behavioral task
behavioral1
Sample
21611a8c76169a345715cf0d6dbf9e495e71ad235ed11bca5ee38ec281f75fc2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
21611a8c76169a345715cf0d6dbf9e495e71ad235ed11bca5ee38ec281f75fc2.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
C:\Recovery\How To Restore Your Files.txt
http://babukq4e2p4wu4iq.onion/login.php?id=p9gFgBg5TsdcO3mV9mf2RJlJoI0iy1
Targets
-
-
Target
21611a8c76169a345715cf0d6dbf9e495e71ad235ed11bca5ee38ec281f75fc2
-
Size
241KB
-
MD5
5bb957a511d230c271fae129f48f1fdf
-
SHA1
a72f01cf027c7e385bbfc2488c91db14dadc9fac
-
SHA256
21611a8c76169a345715cf0d6dbf9e495e71ad235ed11bca5ee38ec281f75fc2
-
SHA512
5f815534114d0099cd28a5f732d0c6fca59ce535e1b55a42b99d22ca9ebcc921d9430bed9a36e723035326716d8b6f8872f748ed075305a1d4b1933eec92ee23
-
SSDEEP
6144:fyGt4iW5Mpj4tZx80FYuiHAZ2CLR+D7XnrlAPgT7:f94o4XRFYsZbt+D7nhj
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (441) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-