General
-
Target
VirusShare_09e28e9a94fee8af07007497677976fc
-
Size
327KB
-
Sample
240610-mfkpesgd83
-
MD5
09e28e9a94fee8af07007497677976fc
-
SHA1
383a448b39b3eb8917cf36661996ca2c933ae53e
-
SHA256
8d1386773be9c28c6b3a5b5aa6838cf575189cedf17544105b95500c156b8f7e
-
SHA512
a7a705bfa8cec58de945e86e82f2dcdb658b8f0b1d8aa606caf35e1d6860e2d3ea890c6d974dd8c692ae260d1d342f2ff875880a04f247290089c477cc9d4c02
-
SSDEEP
6144:UpLp0syTnvooi3umGCJ1aynXgtGF0bo8ZZma/PC4yUYS5xCKszrQZ9:UpLesyNiVRJ1a6Xgtf3ZFPRY1zrU
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_09e28e9a94fee8af07007497677976fc.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
VirusShare_09e28e9a94fee8af07007497677976fc.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+qvplh.txt
http://t54ndnku456ngkwsudqer.wallymac.com/C7A8532DC4B9978E
http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/C7A8532DC4B9978E
http://hrfgd74nfksjdcnnklnwefvdsf.materdunst.com/C7A8532DC4B9978E
http://xlowfznrg4wf7dli.onion/C7A8532DC4B9978E
Extracted
C:\Program Files\7-Zip\Lang\_ReCoVeRy_+wupte.txt
http://t54ndnku456ngkwsudqer.wallymac.com/A7BAB338BE6B889
http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/A7BAB338BE6B889
http://hrfgd74nfksjdcnnklnwefvdsf.materdunst.com/A7BAB338BE6B889
http://xlowfznrg4wf7dli.onion/A7BAB338BE6B889
Targets
-
-
Target
VirusShare_09e28e9a94fee8af07007497677976fc
-
Size
327KB
-
MD5
09e28e9a94fee8af07007497677976fc
-
SHA1
383a448b39b3eb8917cf36661996ca2c933ae53e
-
SHA256
8d1386773be9c28c6b3a5b5aa6838cf575189cedf17544105b95500c156b8f7e
-
SHA512
a7a705bfa8cec58de945e86e82f2dcdb658b8f0b1d8aa606caf35e1d6860e2d3ea890c6d974dd8c692ae260d1d342f2ff875880a04f247290089c477cc9d4c02
-
SSDEEP
6144:UpLp0syTnvooi3umGCJ1aynXgtGF0bo8ZZma/PC4yUYS5xCKszrQZ9:UpLesyNiVRJ1a6Xgtf3ZFPRY1zrU
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (426) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-