General
-
Target
b187c5a1450f1cd356c98973d8f5447a66ca4d3fba9a2452fbd3467cf108ff69
-
Size
1.2MB
-
Sample
240612-dayveszakk
-
MD5
8e6449ffc8d525909adc506f97eec4ef
-
SHA1
118bdbcd547d93d56308d482f87f358be39ad776
-
SHA256
b187c5a1450f1cd356c98973d8f5447a66ca4d3fba9a2452fbd3467cf108ff69
-
SHA512
3c9e3acbd0450b802b74a291786310ffe6421f6764729fde39df2e30a0c3075317c7d5dca0455a0f5585952412b3c04cc70e22e42ed3ef5ea63654c5f6a34276
-
SSDEEP
12288:ejUJ0ixiYuFAnyKKzqj9uLucMDiPDmcMdsx/3Ot3s8fjVOJ/i6h62G0Go01x4Coa:eQvxiYuFA2ej9ekiP9xA8M
Static task
static1
Behavioral task
behavioral1
Sample
b187c5a1450f1cd356c98973d8f5447a66ca4d3fba9a2452fbd3467cf108ff69.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
b187c5a1450f1cd356c98973d8f5447a66ca4d3fba9a2452fbd3467cf108ff69.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+tjrba.txt
http://t54ndnku456ngkwsudqer.wallymac.com/1631E88DB389198B
http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/1631E88DB389198B
http://hrfgd74nfksjdcnnklnwefvdsf.materdunst.com/1631E88DB389198B
http://xlowfznrg4wf7dli.onion/1631E88DB389198B
Targets
-
-
Target
b187c5a1450f1cd356c98973d8f5447a66ca4d3fba9a2452fbd3467cf108ff69
-
Size
1.2MB
-
MD5
8e6449ffc8d525909adc506f97eec4ef
-
SHA1
118bdbcd547d93d56308d482f87f358be39ad776
-
SHA256
b187c5a1450f1cd356c98973d8f5447a66ca4d3fba9a2452fbd3467cf108ff69
-
SHA512
3c9e3acbd0450b802b74a291786310ffe6421f6764729fde39df2e30a0c3075317c7d5dca0455a0f5585952412b3c04cc70e22e42ed3ef5ea63654c5f6a34276
-
SSDEEP
12288:ejUJ0ixiYuFAnyKKzqj9uLucMDiPDmcMdsx/3Ot3s8fjVOJ/i6h62G0Go01x4Coa:eQvxiYuFA2ej9ekiP9xA8M
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (425) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-