General
-
Target
9c9ffa991993b4ad21844cdca196ea1e_JaffaCakes118
-
Size
544KB
-
Sample
240611-b69wfszaqd
-
MD5
9c9ffa991993b4ad21844cdca196ea1e
-
SHA1
4f610f33d5587d51ffac9b9cfc85b4bc15274184
-
SHA256
767aa6573ba24b7ac68d13864d82655988e26312277921b527e29ea2054dee04
-
SHA512
bfe59dafdcb4f8431f4df9c7c281cf50eb396fc6cbf64fe05ab3df7fcea5c63b3ee0028f6f05b8b60397f9b5083e9b828489c2fa031ee1faa24aba98e9d7d76a
-
SSDEEP
12288:YeuQR8iHxZ/oUSGh1RfgV6dB33gyPCgtbI3J4opPduJbIW:3HRtHxqBGhfSABAU18CopPdKf
Static task
static1
Behavioral task
behavioral1
Sample
Trojan.Ransom.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Trojan.Ransom.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
Extracted
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
Targets
-
-
Target
Trojan.Ransom.CoronaVirus
-
Size
1.0MB
-
MD5
055d1462f66a350d9886542d4d79bc2b
-
SHA1
f1086d2f667d807dbb1aa362a7a809ea119f2565
-
SHA256
dddf7894b2e6aafa1903384759d68455c3a4a8348a7e2da3bd272555eba9bec0
-
SHA512
2c5e570226252bdb2104c90d5b75f11493af8ed1be8cb0fd14e3f324311a82138753064731b80ce8e8b120b3fe7009b21a50e9f4583d534080e28ab84b83fee1
-
SSDEEP
24576:FRYz/ERA0eMuWfHvgPw/83JI8CorP9qY0:FE/yADMuYvgP93JIc2
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (323) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-