General
-
Target
3491a946bea7d927d02ae2a28b1001f40a3058f9ec98266f3dc34d472b746a17
-
Size
12KB
-
Sample
240724-tn15psvenk
-
MD5
f48848976afbef26386193b8b385c2c5
-
SHA1
fd2198121fef5dc2416c98951df15d7de77139f1
-
SHA256
3491a946bea7d927d02ae2a28b1001f40a3058f9ec98266f3dc34d472b746a17
-
SHA512
f9ae08752da366efc65076b40fe56cc377e6f2c8c9189a43e810efaa8dc148acb86fc903f0edfe7fe3eb7b2de40ece6db662afb5fabee057d12972ccb79a062e
-
SSDEEP
384:EGJ9ET7QSDdzh2Vzkir50V3tK4YUYhwpIhT2ZkyI:T9EXQaN2V1+tK4Y5IZk3
Static task
static1
Behavioral task
behavioral1
Sample
30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
\Device\HarddiskVolume1\Boot\cs-CZ\How To Restore Your Files.txt
https://i.imgur.com/RzYzVnY.png
https://i.imgur.com/kJzIOqn.png
https://i.imgur.com/bFdNbyO.png
http://babukq4e2p4wu4iq.onion/login.php?id=0KflFXBAmSHtJrtKWtOPzxZmhJATon
Targets
-
-
Target
30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe
-
Size
31KB
-
MD5
dd7f88a68a76acc0be9eb0515d54a82a
-
SHA1
ca205a28b8dbd74c60fdeaf522804d5a2a45dd0b
-
SHA256
30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8
-
SHA512
8e99c1d3291dacaf13c7aff75549d50484b593022bdb82cb3ecffd58f0bbf1dd1ae4deeb09f072d4c3f1b8918a0bc785a397143863466975dad950e115db5af6
-
SSDEEP
768:73QN4DGrqBLP977YowZe478mR26fgjVyBm8Je7tFv/7iJFzMWe:7gdoT93DaRXf5B+tFcJe
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (407) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1