General
-
Target
VirusShare_9137481ae47cb028ea325c76a6298798
-
Size
24.4MB
-
Sample
240719-qx588sxcnf
-
MD5
9137481ae47cb028ea325c76a6298798
-
SHA1
2f9c8d2490566bb08dcb3c6666cf204392d2b317
-
SHA256
9dca05d456e7a2f665bc3d92c883574754718441a6075de6d09a918e67ae1035
-
SHA512
4b17225458d0ac9e5b916c15cd6cb89c493af480e77bf001ad8ca6cfe422ed454061c36b2a843277e6711f164070d1baa5b42224f228bc059311889e9285de90
-
SSDEEP
393216:fqxZWG6E9nJi+AnsobtOKLzz4F0Cb7E+SVCibwjVpVjXrnharBxdsbK+u4XAfrmY:SC/eJi+AsrKCrEBrwzVDrnhalDI/YmR+
Behavioral task
behavioral1
Sample
files/Yasuo.Paypal.v4.5.5.5.exe
Resource
win7-20240704-en
Malware Config
Targets
-
-
Target
files/Yasuo.Paypal.v4.5.5.5.exe
-
Size
436KB
-
MD5
3bee1d24189d4941f68b96da6e207be4
-
SHA1
dce911b1c05da965c8733935723b88bc29d12756
-
SHA256
a375201f22b6e71d8ea0f81266242e4638e1754aeee14059e9c5e39026d6c710
-
SHA512
a40b01c630ff2c4b90a2e1bbf285c5d558193ee0fba79a3210a56408087ca828292269945e3202f65b8eb038a565b1ea8a18d185864ba9dc4073a3633c86ca29
-
SSDEEP
12288:5l9mnmYK1bcy9oNm3/oK14MfZGLBddXLA:cqzONmQrBM
Score10/10-
Jigsaw Ransomware
Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.
-
Renames multiple (2521) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE
-
Adds Run key to start application
-