General
-
Target
VirusShare_c9ef69554082be3467df433a15e7ab45
-
Size
321KB
-
Sample
240610-1swt4ssgkm
-
MD5
c9ef69554082be3467df433a15e7ab45
-
SHA1
79c01bf85a712ddf6a4d54e9db281a8310a12c15
-
SHA256
0db818ad2b03a8003c1b923985b3cd74ed82272205b3372796b192d2661824ac
-
SHA512
13d818b734a9ee2d1cd2bda66ae6213f7fb7e9a74f0175ae37b85906816341e6224cdf1d5f57487e21b80d9782cee75db8acbd3752a303569fc8c6fa2598a4f9
-
SSDEEP
6144:cL42La41ctAaWLBbYcTDASiBdRIGt4MCZnsdbTo07BTT9OyIO:I42LasctABLBz/Udu04MEnsdbTo01VO8
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_c9ef69554082be3467df433a15e7ab45.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
VirusShare_c9ef69554082be3467df433a15e7ab45.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\restore_files_smlkd.txt
http://qw2234duoiyu.h2fyr6785jhdhfg.com/5C6A369C2E66856
http://awoeinf832as.wo49i277rnw.com/5C6A369C2E66856
https://kb63vhjuk3wh4ex7.onion.to/5C6A369C2E66856
http://kb63vhjuk3wh4ex7.onion/5C6A369C2E66856
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\restore_files_smlkd.html
https://kb63vhjuk3wh4ex7.onion.to/5C6A369C2E66856</a>
Extracted
C:\Program Files\7-Zip\Lang\restore_files_felny.txt
http://qw2234duoiyu.h2fyr6785jhdhfg.com/63EC4070FC173D71
http://awoeinf832as.wo49i277rnw.com/63EC4070FC173D71
https://kb63vhjuk3wh4ex7.onion.to/63EC4070FC173D71
http://kb63vhjuk3wh4ex7.onion/63EC4070FC173D71
Extracted
C:\Program Files\7-Zip\Lang\restore_files_felny.html
https://kb63vhjuk3wh4ex7.onion.to/63EC4070FC173D71</a>
Targets
-
-
Target
VirusShare_c9ef69554082be3467df433a15e7ab45
-
Size
321KB
-
MD5
c9ef69554082be3467df433a15e7ab45
-
SHA1
79c01bf85a712ddf6a4d54e9db281a8310a12c15
-
SHA256
0db818ad2b03a8003c1b923985b3cd74ed82272205b3372796b192d2661824ac
-
SHA512
13d818b734a9ee2d1cd2bda66ae6213f7fb7e9a74f0175ae37b85906816341e6224cdf1d5f57487e21b80d9782cee75db8acbd3752a303569fc8c6fa2598a4f9
-
SSDEEP
6144:cL42La41ctAaWLBbYcTDASiBdRIGt4MCZnsdbTo07BTT9OyIO:I42LasctABLBz/Udu04MEnsdbTo01VO8
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (427) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-