General
-
Target
VirusShare_727728da96243c4d517772d4b9b566af
-
Size
283KB
-
Sample
240610-1m2s6ssdpq
-
MD5
727728da96243c4d517772d4b9b566af
-
SHA1
5bff1b9359d8d0e1b31198b8d3c3531ba9aad81f
-
SHA256
729ed087ef318321aff69aae726b28789b50b11036d55995feceaf37b6510a80
-
SHA512
2d3702634a6420a127b9add5d0a6cbbf2fadf2f0909527241c24f329e270ff3bc2e702a1449877be9b0867a98c372b969106415e435a99c737ed37b54c364352
-
SSDEEP
6144:Za5M9hveSfhKeH50Sb+TS2G2CLWeOgqitKc6EmpW8nH6J:oMG21fb+TSeCLWeOgqitKjbH6J
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_727728da96243c4d517772d4b9b566af.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
VirusShare_727728da96243c4d517772d4b9b566af.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\restore_files_hshtd.txt
http://lk2gaflsgh.jgy658snfyfnvh.com/4487E2884620FC19
http://dg62wor94m.sdsfg834mfuuw.com/4487E2884620FC19
https://djdkduep62kz4nzx.onion.to/4487E2884620FC19
http://djdkduep62kz4nzx.onion/4487E2884620FC19
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\restore_files_hshtd.html
https://djdkduep62kz4nzx.onion.to/4487E2884620FC19</a>
Targets
-
-
Target
VirusShare_727728da96243c4d517772d4b9b566af
-
Size
283KB
-
MD5
727728da96243c4d517772d4b9b566af
-
SHA1
5bff1b9359d8d0e1b31198b8d3c3531ba9aad81f
-
SHA256
729ed087ef318321aff69aae726b28789b50b11036d55995feceaf37b6510a80
-
SHA512
2d3702634a6420a127b9add5d0a6cbbf2fadf2f0909527241c24f329e270ff3bc2e702a1449877be9b0867a98c372b969106415e435a99c737ed37b54c364352
-
SSDEEP
6144:Za5M9hveSfhKeH50Sb+TS2G2CLWeOgqitKc6EmpW8nH6J:oMG21fb+TSeCLWeOgqitKjbH6J
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (422) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-