General
-
Target
0d148218983f96167795e70053b0960d5a501a30b3c45e626e9228af49af2248.zip
-
Size
4.6MB
-
Sample
240626-zbgs7avdpj
-
MD5
1a812603c9d6bc0ac351e94673b4ab3d
-
SHA1
850141c034f57e4f5f6a606c01f9a25272000c6c
-
SHA256
17c3078f12b4e4458e00b50eec5a68b3744845e301232a6a354c81ed6df1b2aa
-
SHA512
66da7d621f2bab6044543e01c90a7ce8ba01241ce0fa14da4d4cbe721c19d7507152742b10ccaa8f099920bc3ce5dd3b63d8ffcec353cc09b03dbbaaf3610986
-
SSDEEP
98304:0B1eLHh1oSrrTBQ0h7i0qtdthczdRhfPFi8fBLGeOnUYDeloVsUhn6Yb4nf8Z:03eLHC0gRXcHpBuU+TV9uC
Behavioral task
behavioral1
Sample
0d148218983f96167795e70053b0960d5a501a30b3c45e626e9228af49af2248.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0d148218983f96167795e70053b0960d5a501a30b3c45e626e9228af49af2248.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
0d148218983f96167795e70053b0960d5a501a30b3c45e626e9228af49af2248.exe
Resource
win11-20240508-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\ÊÀÊ ÐÀÑØÈÔÐÎÂÀÒÜ ÔÀÉËÛ.txt
https://kay-software.ru
Targets
-
-
Target
0d148218983f96167795e70053b0960d5a501a30b3c45e626e9228af49af2248.exe
-
Size
4.7MB
-
MD5
1df3028b6a1e41a393bb542df2274145
-
SHA1
332899d8f3e304a4447bc7256bbc127c34303291
-
SHA256
0d148218983f96167795e70053b0960d5a501a30b3c45e626e9228af49af2248
-
SHA512
a73115bb838839a1a0a2e4033265422e37eba53cbd295277f5139a1a223bbd2cc3381355069269943f82f834cb6eeec36c5b41c7ab98fa89b9fce03903003308
-
SSDEEP
98304:jbxXg98fQNhyC+Dt1RA9hgpG3qhWXLpSwlzf9UT7fJ/sBo4:jp1fQNhN0EgpTWXLpS8ZGx/sBo4
Score10/10-
Detected Xorist Ransomware
-
Renames multiple (5486) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops file in Drivers directory
-
Manipulates Digital Signatures
Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.
-
Drops startup file
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-