General
-
Target
alldat.tar.gz
-
Size
3.0MB
-
Sample
240703-swzfeawcrb
-
MD5
91f32121c212d4572ae024c5754a124e
-
SHA1
528c11b74ceddd0e0e41c68a6c17dea12ca6370b
-
SHA256
8fd67a431ae65bf9e21564c40f4fb7af65ee1b072b1aef691c63f82fc33aa11a
-
SHA512
bfad07160ead6342b70b928f3fdddb6f6a3ac43643b23fbf3ccd8a362c00e5e06a2efa409fc67853493fb915ce7aff4f3622b2ef6c2eefeedb0575c9f696bb80
-
SSDEEP
98304:YMmjtiBSTek2M7z+m7duS6cW8Q/gxmWJSL:YMm8Bw/r7hYS6c1txmh
Static task
static1
Behavioral task
behavioral1
Sample
sample.tar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
sample.tar
Resource
win10v2004-20240508-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Adobe\Acrobat\9.0\CyberVolk_ReadMe.txt
https://t.me/cubervolk
Targets
-
-
Target
sample
-
Size
7.8MB
-
MD5
f823e7fcc3dcc9bfacbd649ead857d15
-
SHA1
9a46483ade0f43b6d1aed2fd259a255bd4daa1f3
-
SHA256
c97862eb9d56f566352cfc548542770d414edc375c3a0b767597cd6d1f47845b
-
SHA512
d74e988cdc2122c05448017581a7274b2ed0abfdcf7ded1dac8ecaa20e9c1af0c2012516aaf54fc4d6809c75b6cbf46eaadb6c49367a74b68169526ae3efc8ac
-
SSDEEP
98304:d+v9K8MgmB4oIWcCJ3ZZVL8oYi5lTkZkmla1DXL:y4uWcCT9Gzl
Score10/10-
Renames multiple (880) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-