General
-
Target
VirusShare_2bfb0ef1b81124ca61c93c341a9ed164
-
Size
616KB
-
Sample
240610-mwt8ssgg85
-
MD5
2bfb0ef1b81124ca61c93c341a9ed164
-
SHA1
80a77d8af4702dc597bc48838f9140e1d3ed2bc0
-
SHA256
86e08c4190074fa5774eb0f37afacf780bfe1b4f1335cccfcd1d5fe140e09b5b
-
SHA512
2c336f88c9c7c3f7c8c3ae87f392f92ece3e28155b08b25f31c522b3df509bef5803240647a2853bc34567f943e6afd5dfba732ddbbfe1e2cffd0e272a6f97a0
-
SSDEEP
12288:Iv/fMH3Mu7vOlM7CjCkczgmziP+1RTwu7vOlM7CjCkczg:Iv/fMfvQjCM+3vQj
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_2bfb0ef1b81124ca61c93c341a9ed164.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
VirusShare_2bfb0ef1b81124ca61c93c341a9ed164.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+odojl.txt
http://p57gest54celltraf743knjf.mottesapo.com/D028C17C49C9201D
http://k4restportgonst34d23r.oftpony.at/D028C17C49C9201D
http://rr7mdgjbjhbefvkhbashrg.ginnypecht.com/D028C17C49C9201D
http://fwgrhsao3aoml7ej.onion/D028C17C49C9201D
http://fwgrhsao3aoml7ej.ONION/D028C17C49C9201D
Extracted
C:\Program Files\7-Zip\Lang\Recovery+qtlts.txt
http://p57gest54celltraf743knjf.mottesapo.com/5CB867221FE24DB3
http://k4restportgonst34d23r.oftpony.at/5CB867221FE24DB3
http://rr7mdgjbjhbefvkhbashrg.ginnypecht.com/5CB867221FE24DB3
http://fwgrhsao3aoml7ej.onion/5CB867221FE24DB3
http://fwgrhsao3aoml7ej.ONION/5CB867221FE24DB3
Targets
-
-
Target
VirusShare_2bfb0ef1b81124ca61c93c341a9ed164
-
Size
616KB
-
MD5
2bfb0ef1b81124ca61c93c341a9ed164
-
SHA1
80a77d8af4702dc597bc48838f9140e1d3ed2bc0
-
SHA256
86e08c4190074fa5774eb0f37afacf780bfe1b4f1335cccfcd1d5fe140e09b5b
-
SHA512
2c336f88c9c7c3f7c8c3ae87f392f92ece3e28155b08b25f31c522b3df509bef5803240647a2853bc34567f943e6afd5dfba732ddbbfe1e2cffd0e272a6f97a0
-
SSDEEP
12288:Iv/fMH3Mu7vOlM7CjCkczgmziP+1RTwu7vOlM7CjCkczg:Iv/fMfvQjCM+3vQj
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (427) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-