General
-
Target
05f9891bb4ca2b87b476e3d3f415e329a547d3cb65741b908cd570eb96575767
-
Size
439KB
-
Sample
240810-r97hhathml
-
MD5
95d8ef6aaeae33dae91636b2bde473b8
-
SHA1
6e79574a1fd0af774f985b3fcf646039d30cc7e8
-
SHA256
05f9891bb4ca2b87b476e3d3f415e329a547d3cb65741b908cd570eb96575767
-
SHA512
2982681c763db9dc3af710db4d8ba260d8c5591a37a9df13529a4e7a0a08cfd7fd6dbde5c6922b69baeeaf3222212a6697cf961304ec386e1dd5f5b022e13061
-
SSDEEP
6144:XsaeVjbUSAODc/mDHJKzBJvPKcQQfHAijx7TSig0yw6J:XsamHDDpuBhKX2jlGiyw6
Static task
static1
Behavioral task
behavioral1
Sample
05f9891bb4ca2b87b476e3d3f415e329a547d3cb65741b908cd570eb96575767.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
05f9891bb4ca2b87b476e3d3f415e329a547d3cb65741b908cd570eb96575767.exe
Resource
win11-20240802-en
Malware Config
Extracted
C:\HdbtqCuyh.README.txt
Targets
-
-
Target
05f9891bb4ca2b87b476e3d3f415e329a547d3cb65741b908cd570eb96575767
-
Size
439KB
-
MD5
95d8ef6aaeae33dae91636b2bde473b8
-
SHA1
6e79574a1fd0af774f985b3fcf646039d30cc7e8
-
SHA256
05f9891bb4ca2b87b476e3d3f415e329a547d3cb65741b908cd570eb96575767
-
SHA512
2982681c763db9dc3af710db4d8ba260d8c5591a37a9df13529a4e7a0a08cfd7fd6dbde5c6922b69baeeaf3222212a6697cf961304ec386e1dd5f5b022e13061
-
SSDEEP
6144:XsaeVjbUSAODc/mDHJKzBJvPKcQQfHAijx7TSig0yw6J:XsamHDDpuBhKX2jlGiyw6
Score10/10-
Renames multiple (601) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-