General
-
Target
a2449e48a4047644ad84d4f00409c2d0N
-
Size
206KB
-
Sample
240913-acc4ystcnb
-
MD5
a2449e48a4047644ad84d4f00409c2d0
-
SHA1
b268604e5c70f6f3add1dec4024d2935d3cb2da2
-
SHA256
3d9a47a80e9022fafda9c5bc3e50155adb282395f50748e126a02a73113b625c
-
SHA512
6bbd90299a583b42d41b3a3a8a4ff43f2eca16b67e6eb53800b883de36dadfe4404a62293368ba85410145f0c48ce3398f587ed1ab91594688942a6c5d222a87
-
SSDEEP
3072:qUQPGOzKv7Mu6t/+xwgHX+MB7+4TFY/ahEFAj2I4Nk:6eOmTD6cygDBa42FQp5
Behavioral task
behavioral1
Sample
a2449e48a4047644ad84d4f00409c2d0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a2449e48a4047644ad84d4f00409c2d0N.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\HOW TO DECRYPT FILES.txt
Targets
-
-
Target
a2449e48a4047644ad84d4f00409c2d0N
-
Size
206KB
-
MD5
a2449e48a4047644ad84d4f00409c2d0
-
SHA1
b268604e5c70f6f3add1dec4024d2935d3cb2da2
-
SHA256
3d9a47a80e9022fafda9c5bc3e50155adb282395f50748e126a02a73113b625c
-
SHA512
6bbd90299a583b42d41b3a3a8a4ff43f2eca16b67e6eb53800b883de36dadfe4404a62293368ba85410145f0c48ce3398f587ed1ab91594688942a6c5d222a87
-
SSDEEP
3072:qUQPGOzKv7Mu6t/+xwgHX+MB7+4TFY/ahEFAj2I4Nk:6eOmTD6cygDBa42FQp5
-
Detected Xorist Ransomware
-
Renames multiple (9181) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops file in Drivers directory
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-