General
-
Target
VirusShare_501d52bcc05636268a66a6e9f1c5c4ad
-
Size
368KB
-
Sample
240610-ng1mpshd65
-
MD5
501d52bcc05636268a66a6e9f1c5c4ad
-
SHA1
2199071c4190b6aae6ec7dc65ced83301883d714
-
SHA256
7659872c938b820b351446509964ed4fcbc405b58e43694722f00bb42b277dd6
-
SHA512
d72db00dad74a6d15d59cd7dbb401f5f86706242b95a6c57dc12c9b33590fefe951b56043eae3f0125bd5240baad46edd919872820e40a8dac5109a3a7e222b8
-
SSDEEP
6144:GQNUdPR6oncUtPLJoJi8ju8FQNXsyR36GeHba2grj9F4SENppTUHtnvR3aF3J9PQ:jNUdc6wA8P2cyF6T7a2gH9F4dzhUl6rP
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_501d52bcc05636268a66a6e9f1c5c4ad.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
VirusShare_501d52bcc05636268a66a6e9f1c5c4ad.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+ygepc.txt
http://prest54538hnksjn4kjfwdbhwere.hotchunman.com/140D20891A1181
http://b4youfred5485jgsa3453f.italazudda.com/140D20891A1181
http://5rport45vcdef345adfkksawe.bematvocal.at/140D20891A1181
http://fwgrhsao3aoml7ej.onion/140D20891A1181
http://fwgrhsao3aoml7ej.ONION/140D20891A1181
Extracted
C:\Program Files\7-Zip\Lang\Recovery+kjkuq.txt
http://prest54538hnksjn4kjfwdbhwere.hotchunman.com/D361FA807B716C4
http://b4youfred5485jgsa3453f.italazudda.com/D361FA807B716C4
http://5rport45vcdef345adfkksawe.bematvocal.at/D361FA807B716C4
http://fwgrhsao3aoml7ej.onion/D361FA807B716C4
http://fwgrhsao3aoml7ej.ONION/D361FA807B716C4
Targets
-
-
Target
VirusShare_501d52bcc05636268a66a6e9f1c5c4ad
-
Size
368KB
-
MD5
501d52bcc05636268a66a6e9f1c5c4ad
-
SHA1
2199071c4190b6aae6ec7dc65ced83301883d714
-
SHA256
7659872c938b820b351446509964ed4fcbc405b58e43694722f00bb42b277dd6
-
SHA512
d72db00dad74a6d15d59cd7dbb401f5f86706242b95a6c57dc12c9b33590fefe951b56043eae3f0125bd5240baad46edd919872820e40a8dac5109a3a7e222b8
-
SSDEEP
6144:GQNUdPR6oncUtPLJoJi8ju8FQNXsyR36GeHba2grj9F4SENppTUHtnvR3aF3J9PQ:jNUdc6wA8P2cyF6T7a2gH9F4dzhUl6rP
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (420) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-