General
-
Target
VirusShare_5885d072fb73bdd355e85b67bcde3bfd
-
Size
368KB
-
Sample
240610-nrj3pshd2v
-
MD5
5885d072fb73bdd355e85b67bcde3bfd
-
SHA1
538b93b18131e4d9de79f87f6b156c2d46895045
-
SHA256
d3f5990770291c25a4ff14e8a6fe033f7ad1689c6206ed41eb7ed253a1c2c348
-
SHA512
7da4dbbb0c98cd2ad56ffe28a23ed67e66583a0822e0e16aadfa102447d7a22acbd9e526fc9a9ee3ecae68389b02e12347182a64829cd762559ed083ee94882e
-
SSDEEP
6144:iQNUdPR6oncUtPLJoJi8ju8FQNXsyR36GeHba2grj9F4SENppTUHtnvR3aF3J9PQ:XNUdc6wA8P2cyF6T7a2gH9F4dzhUl6rP
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_5885d072fb73bdd355e85b67bcde3bfd.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
VirusShare_5885d072fb73bdd355e85b67bcde3bfd.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+cnfuw.txt
http://prest54538hnksjn4kjfwdbhwere.hotchunman.com/4E62CBE897AFC44E
http://b4youfred5485jgsa3453f.italazudda.com/4E62CBE897AFC44E
http://5rport45vcdef345adfkksawe.bematvocal.at/4E62CBE897AFC44E
http://fwgrhsao3aoml7ej.onion/4E62CBE897AFC44E
http://fwgrhsao3aoml7ej.ONION/4E62CBE897AFC44E
Extracted
C:\Program Files\7-Zip\Lang\Recovery+mmplo.txt
http://prest54538hnksjn4kjfwdbhwere.hotchunman.com/C7FAFF798E63542
http://b4youfred5485jgsa3453f.italazudda.com/C7FAFF798E63542
http://5rport45vcdef345adfkksawe.bematvocal.at/C7FAFF798E63542
http://fwgrhsao3aoml7ej.onion/C7FAFF798E63542
http://fwgrhsao3aoml7ej.ONION/C7FAFF798E63542
Targets
-
-
Target
VirusShare_5885d072fb73bdd355e85b67bcde3bfd
-
Size
368KB
-
MD5
5885d072fb73bdd355e85b67bcde3bfd
-
SHA1
538b93b18131e4d9de79f87f6b156c2d46895045
-
SHA256
d3f5990770291c25a4ff14e8a6fe033f7ad1689c6206ed41eb7ed253a1c2c348
-
SHA512
7da4dbbb0c98cd2ad56ffe28a23ed67e66583a0822e0e16aadfa102447d7a22acbd9e526fc9a9ee3ecae68389b02e12347182a64829cd762559ed083ee94882e
-
SSDEEP
6144:iQNUdPR6oncUtPLJoJi8ju8FQNXsyR36GeHba2grj9F4SENppTUHtnvR3aF3J9PQ:XNUdc6wA8P2cyF6T7a2gH9F4dzhUl6rP
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (425) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-