General
-
Target
razrusheniye.exe
-
Size
19KB
-
Sample
240803-fx73qavamp
-
MD5
16b6afdcc2f1a7351c51b8a8ee02f7d4
-
SHA1
9eebbdc51c218f350ab3944c5d90f053851131aa
-
SHA256
fccb2f8c7338203218e669dda9cecfa67230a37f23036bcff8732ea3ad581079
-
SHA512
607a5ebb96fb8b600fe9f37c48e2f3916cffd38a6bd0f857f7538eb923e05b6eb488a76a3f4d57825d5fa1f63c7980452bc403b4bbc7d6780f134eca30e35a3c
-
SSDEEP
192:T8qlBulfDKXlZ+uWD44lzaGxGUeLoHJEzSfNcx0uwNQR78Dzf0sVEcNKE5tfUXNv:wKBunvU4Zaykoi+fbzf0sRKR9kDG1
Static task
static1
Behavioral task
behavioral1
Sample
razrusheniye.exe
Resource
win7-20240704-en
Malware Config
Extracted
C:\Users\Admin\Videos\README.txt
Targets
-
-
Target
razrusheniye.exe
-
Size
19KB
-
MD5
16b6afdcc2f1a7351c51b8a8ee02f7d4
-
SHA1
9eebbdc51c218f350ab3944c5d90f053851131aa
-
SHA256
fccb2f8c7338203218e669dda9cecfa67230a37f23036bcff8732ea3ad581079
-
SHA512
607a5ebb96fb8b600fe9f37c48e2f3916cffd38a6bd0f857f7538eb923e05b6eb488a76a3f4d57825d5fa1f63c7980452bc403b4bbc7d6780f134eca30e35a3c
-
SSDEEP
192:T8qlBulfDKXlZ+uWD44lzaGxGUeLoHJEzSfNcx0uwNQR78Dzf0sVEcNKE5tfUXNv:wKBunvU4Zaykoi+fbzf0sRKR9kDG1
Score10/10-
Renames multiple (4749) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops file in Drivers directory
-
Boot or Logon Autostart Execution: Print Processors
Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.
-
Drops startup file
-
Drops file in System32 directory
-