General
-
Target
VirusShare_3bf7734a289b0eaf5ab9b72c514d2c02
-
Size
261KB
-
Sample
240607-wx1awabg5t
-
MD5
3bf7734a289b0eaf5ab9b72c514d2c02
-
SHA1
ae2fed972152fad680aca6d97944fb6cd6c701ff
-
SHA256
50b54e6376369ac351eaecb9351b7633333209fd54c949fab5e774be0a925db6
-
SHA512
68813e3eb35b938ba065012b85b3d0bc30ffcc6aa0daabbe81313412b9af9025429f861943376853a984788f1acf9a352cf4030ffc33361dab50545b76f6e714
-
SSDEEP
6144:AA8JYe8rWneBxg4RUta7Jq3XvojXU7yJzPe9WCilKr:he8ps4OUFqOXU7yJ69fisr
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_3bf7734a289b0eaf5ab9b72c514d2c02.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
VirusShare_3bf7734a289b0eaf5ab9b72c514d2c02.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\restore_files_fqojh.txt
http://nasdki39dawk.oj998fh4txkjh.com/18B7B8779B57D1BE
http://awoeinf832as.wo49i277rnw.com/18B7B8779B57D1BE
https://zpr5huq4bgmutfnf.onion.to/18B7B8779B57D1BE
http://zpr5huq4bgmutfnf.onion/18B7B8779B57D1BE
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\restore_files_fqojh.html
https://zpr5huq4bgmutfnf.onion.to/18B7B8779B57D1BE</a>
Targets
-
-
Target
VirusShare_3bf7734a289b0eaf5ab9b72c514d2c02
-
Size
261KB
-
MD5
3bf7734a289b0eaf5ab9b72c514d2c02
-
SHA1
ae2fed972152fad680aca6d97944fb6cd6c701ff
-
SHA256
50b54e6376369ac351eaecb9351b7633333209fd54c949fab5e774be0a925db6
-
SHA512
68813e3eb35b938ba065012b85b3d0bc30ffcc6aa0daabbe81313412b9af9025429f861943376853a984788f1acf9a352cf4030ffc33361dab50545b76f6e714
-
SSDEEP
6144:AA8JYe8rWneBxg4RUta7Jq3XvojXU7yJzPe9WCilKr:he8ps4OUFqOXU7yJ69fisr
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (430) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-