General
-
Target
c530fd188ca29e6de73d3313d7f0a578abd70eaaa314a6b186c062b60f0065a1
-
Size
511KB
-
Sample
240909-ryapdstamk
-
MD5
ebdf82913e04b55207529376c67c678f
-
SHA1
7c6c6ba3f97b46c37d01a8645040d7689fb6fe8d
-
SHA256
c530fd188ca29e6de73d3313d7f0a578abd70eaaa314a6b186c062b60f0065a1
-
SHA512
7c4e8cc55cf26d5c399e2adc21ddd3f5b2c25c4c08caf572202336292904de85be0ce3f2013c0a114bcff9903f656c44ad550da7ade03690fb8b38b0bdd8d5e9
-
SSDEEP
3072:WTvD23a5c8ZAdvMVNel1P/OJpAGiVBzoCeRZdxOnHiF2GBh3RkiBRK9:QvD23a5c8ZY1P/Yad7e2uHP3K
Static task
static1
Behavioral task
behavioral1
Sample
c530fd188ca29e6de73d3313d7f0a578abd70eaaa314a6b186c062b60f0065a1.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c530fd188ca29e6de73d3313d7f0a578abd70eaaa314a6b186c062b60f0065a1.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Program Files (x86)\readme.txt
conti
http://contirecj4hbzmyzuydyzrvm2c65blmvhoj2cvf25zqj2dwrrqcq5oad.onion/
https://contirecovery.top/
Targets
-
-
Target
c530fd188ca29e6de73d3313d7f0a578abd70eaaa314a6b186c062b60f0065a1
-
Size
511KB
-
MD5
ebdf82913e04b55207529376c67c678f
-
SHA1
7c6c6ba3f97b46c37d01a8645040d7689fb6fe8d
-
SHA256
c530fd188ca29e6de73d3313d7f0a578abd70eaaa314a6b186c062b60f0065a1
-
SHA512
7c4e8cc55cf26d5c399e2adc21ddd3f5b2c25c4c08caf572202336292904de85be0ce3f2013c0a114bcff9903f656c44ad550da7ade03690fb8b38b0bdd8d5e9
-
SSDEEP
3072:WTvD23a5c8ZAdvMVNel1P/OJpAGiVBzoCeRZdxOnHiF2GBh3RkiBRK9:QvD23a5c8ZY1P/Yad7e2uHP3K
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Renames multiple (7989) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Drops desktop.ini file(s)
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1