General
-
Target
smert.exe
-
Size
20KB
-
Sample
240728-ywzztswdnb
-
MD5
9741dc2a48ef315a5032a3190c6a9752
-
SHA1
595cfcf134ac6a97a75407350b509ad37666d546
-
SHA256
419b6c03a01ad10354c6f70c9077d0bc97a04ca03d0e39748823c8d604da7fe2
-
SHA512
a8f26e08cdb7078f51f716014499f4af3f0be2ed057cbc3f67da38120d69534ff05a010ab8879ec5bfc692caac7db6f47e777d701d733a6cda307aaddb70cb6f
-
SSDEEP
384:asaFiLCCr05Sx158JLLU4Act6GoMZOaB8BYsszReS:aPwXl1585LUNGoMZOXszR
Static task
static1
Behavioral task
behavioral1
Sample
smert.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
smert.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
smert.exe
-
Size
20KB
-
MD5
9741dc2a48ef315a5032a3190c6a9752
-
SHA1
595cfcf134ac6a97a75407350b509ad37666d546
-
SHA256
419b6c03a01ad10354c6f70c9077d0bc97a04ca03d0e39748823c8d604da7fe2
-
SHA512
a8f26e08cdb7078f51f716014499f4af3f0be2ed057cbc3f67da38120d69534ff05a010ab8879ec5bfc692caac7db6f47e777d701d733a6cda307aaddb70cb6f
-
SSDEEP
384:asaFiLCCr05Sx158JLLU4Act6GoMZOaB8BYsszReS:aPwXl1585LUNGoMZOXszR
Score9/10-
Renames multiple (2029) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-