General
-
Target
873d16767e0895ff109b2a2ae61335f5_JaffaCakes118
-
Size
175KB
-
Sample
240605-szx2raah7z
-
MD5
873d16767e0895ff109b2a2ae61335f5
-
SHA1
15ce4fd25f2709f3a3379a41e51337ddfa6c773c
-
SHA256
77da860cd56ac35ea77e4768745a0c36a3662ad08fca31aa6a5ab1cec5c3d4e0
-
SHA512
280efb73feb2b569444212a708be2e1d9432752ececc7302f4841235c6d76f3d50f2732f12d867b289f9c881a282abf5709918435344d91948ee7570a2d436f5
-
SSDEEP
1536:SqtY8hd8Wu8pI8Cd8hd8dQg0H//3oS34GNkFjYfBCJisl+aeTH+WK/Lf1/hmnVSV:SBoT34/F6BCJiZm
Static task
static1
Malware Config
Extracted
F:\$RECYCLE.BIN\S-1-5-21-4124900551-4068476067-3491212533-1000\SVWJHE-MANUAL.txt
gandcrab
http://gandcrabmfe6mnef.onion/ad31e0c52ed0d64
Targets
-
-
Target
873d16767e0895ff109b2a2ae61335f5_JaffaCakes118
-
Size
175KB
-
MD5
873d16767e0895ff109b2a2ae61335f5
-
SHA1
15ce4fd25f2709f3a3379a41e51337ddfa6c773c
-
SHA256
77da860cd56ac35ea77e4768745a0c36a3662ad08fca31aa6a5ab1cec5c3d4e0
-
SHA512
280efb73feb2b569444212a708be2e1d9432752ececc7302f4841235c6d76f3d50f2732f12d867b289f9c881a282abf5709918435344d91948ee7570a2d436f5
-
SSDEEP
1536:SqtY8hd8Wu8pI8Cd8hd8dQg0H//3oS34GNkFjYfBCJisl+aeTH+WK/Lf1/hmnVSV:SBoT34/F6BCJiZm
-
Renames multiple (255) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-