General

  • Target

    c391ecafe65c7125e0da755f59a10e80N.exe

  • Size

    60KB

  • Sample

    240816-2kqtkaverk

  • MD5

    c391ecafe65c7125e0da755f59a10e80

  • SHA1

    be60173be55fa46eef55b5436fad281f5e8ad009

  • SHA256

    04e1dbac8f1c2e0e7c8cf69e7bb483c1191a892c6cb658c566da0acef657936c

  • SHA512

    fe2fb0b4da030dcc1d62f66ca304490f4f8018ab083d4b129308f5c7ff5bcf82eea2042dcc252833495dc581ea31d68497922ecfa696b79910497197b91ebb14

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcwBcCBcw/tio/tiaZcZGp:V7Zf/FAxTWoJJ7TTQoQa+Ip

Malware Config

Targets

    • Target

      c391ecafe65c7125e0da755f59a10e80N.exe

    • Size

      60KB

    • MD5

      c391ecafe65c7125e0da755f59a10e80

    • SHA1

      be60173be55fa46eef55b5436fad281f5e8ad009

    • SHA256

      04e1dbac8f1c2e0e7c8cf69e7bb483c1191a892c6cb658c566da0acef657936c

    • SHA512

      fe2fb0b4da030dcc1d62f66ca304490f4f8018ab083d4b129308f5c7ff5bcf82eea2042dcc252833495dc581ea31d68497922ecfa696b79910497197b91ebb14

    • SSDEEP

      768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcwBcCBcw/tio/tiaZcZGp:V7Zf/FAxTWoJJ7TTQoQa+Ip

    • Renames multiple (3197) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks