General
-
Target
ef2c7563ee9134a397f8537a865d8510N.exe
-
Size
402KB
-
Sample
240825-erphrawcmm
-
MD5
ef2c7563ee9134a397f8537a865d8510
-
SHA1
b078bed7a6b255809b5cb0e04262b7adbd0fdf2b
-
SHA256
c6c5adf201acff226226adc01cbffecbafdcb2bc2e7e059628a37d8eaa1b90c8
-
SHA512
18adcd69ea119d45d266a4bbfe61278e0c6b461426899da43e6c400af5716fc8f7e05c2be1b027c753eee47302fa7f1328a64aaf0e344f1596dcbccea199eaf6
-
SSDEEP
6144:iqye+d6+Dy91aq9VvyGsmt6TozPMwH6FuDbZ226NGWwHl2FvBxm7ciz4D7:ce+dbU1xy/m0TW/Nl36Cl2vW7c/7
Static task
static1
Behavioral task
behavioral1
Sample
ef2c7563ee9134a397f8537a865d8510N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ef2c7563ee9134a397f8537a865d8510N.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\-!RecOveR!-wchpo++.Txt
http://k234s.ascotsprue.com/86192620B68B19A6
http://ik4dm.mazerunci.at/86192620B68B19A6
http://y4bxj.adozeuds.com/86192620B68B19A6
http://yyhn7fpvq44cqcu3.onion/86192620B68B19A6
Extracted
C:\Program Files\Common Files\DESIGNER\-!RecOveR!-aerla++.Txt
http://k234s.ascotsprue.com/55A55E213623D44
http://ik4dm.mazerunci.at/55A55E213623D44
http://y4bxj.adozeuds.com/55A55E213623D44
http://yyhn7fpvq44cqcu3.onion/55A55E213623D44
Targets
-
-
Target
ef2c7563ee9134a397f8537a865d8510N.exe
-
Size
402KB
-
MD5
ef2c7563ee9134a397f8537a865d8510
-
SHA1
b078bed7a6b255809b5cb0e04262b7adbd0fdf2b
-
SHA256
c6c5adf201acff226226adc01cbffecbafdcb2bc2e7e059628a37d8eaa1b90c8
-
SHA512
18adcd69ea119d45d266a4bbfe61278e0c6b461426899da43e6c400af5716fc8f7e05c2be1b027c753eee47302fa7f1328a64aaf0e344f1596dcbccea199eaf6
-
SSDEEP
6144:iqye+d6+Dy91aq9VvyGsmt6TozPMwH6FuDbZ226NGWwHl2FvBxm7ciz4D7:ce+dbU1xy/m0TW/Nl36Cl2vW7c/7
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Indicator Removal
2File Deletion
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1