General
-
Target
VirusShare_1fca02c9b41ca8164dcbe5624a925036
-
Size
309KB
-
Sample
240610-mtme6sgg47
-
MD5
1fca02c9b41ca8164dcbe5624a925036
-
SHA1
a65d2fdbea2f21772adae110ef03eb187bc0fdac
-
SHA256
90bd8c1f54522db5821ff3ed670531f50e88ec61ce1ab3b5f9c9477cebd79ff3
-
SHA512
423cbe37adf1f7f7ae610d0097368109a4ea767bd58cfd013f6afdbe54d34f430fa6c9287909b99d7177902f97f411e2e1b3c6c3eef8acd7c72a6630e377f2a8
-
SSDEEP
6144:KXWVWipoUM2rSBnr5XdsM9ZWYXOqJsVup/sO3z+WuLY:KiWimUxrUrZxmuOq6VupX40
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_1fca02c9b41ca8164dcbe5624a925036.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
VirusShare_1fca02c9b41ca8164dcbe5624a925036.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\restore_files_evpeg.txt
http://lk2gaflsgh.jgy658snfyfnvh.com/F5CEE7156A8C37B
http://dg62wor94m.sdsfg834mfuuw.com/F5CEE7156A8C37B
https://djdkduep62kz4nzx.onion.to/F5CEE7156A8C37B
http://djdkduep62kz4nzx.onion/F5CEE7156A8C37B
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\restore_files_evpeg.html
https://djdkduep62kz4nzx.onion.to/F5CEE7156A8C37B</a>
Extracted
C:\Program Files\7-Zip\Lang\restore_files_ppmde.html
https://djdkduep62kz4nzx.onion.to/CEDF3292B41299D4</a>
Extracted
C:\Program Files\7-Zip\Lang\restore_files_ppmde.txt
http://lk2gaflsgh.jgy658snfyfnvh.com/CEDF3292B41299D4
http://dg62wor94m.sdsfg834mfuuw.com/CEDF3292B41299D4
https://djdkduep62kz4nzx.onion.to/CEDF3292B41299D4
http://djdkduep62kz4nzx.onion/CEDF3292B41299D4
Targets
-
-
Target
VirusShare_1fca02c9b41ca8164dcbe5624a925036
-
Size
309KB
-
MD5
1fca02c9b41ca8164dcbe5624a925036
-
SHA1
a65d2fdbea2f21772adae110ef03eb187bc0fdac
-
SHA256
90bd8c1f54522db5821ff3ed670531f50e88ec61ce1ab3b5f9c9477cebd79ff3
-
SHA512
423cbe37adf1f7f7ae610d0097368109a4ea767bd58cfd013f6afdbe54d34f430fa6c9287909b99d7177902f97f411e2e1b3c6c3eef8acd7c72a6630e377f2a8
-
SSDEEP
6144:KXWVWipoUM2rSBnr5XdsM9ZWYXOqJsVup/sO3z+WuLY:KiWimUxrUrZxmuOq6VupX40
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (431) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-