General
-
Target
razrusheniye.exe
-
Size
21KB
-
Sample
240913-zc8cjayakd
-
MD5
916b310031e147c6258f89b8727cdac8
-
SHA1
a16f36eccd471ce2c4cee9388949b7a648e3bacd
-
SHA256
0af088e71cd40a89584020f9cb5080c85b6e859bafd866710dadda6438d1cb74
-
SHA512
1197774e65e0e7251692395c5a58f466f5aa1eac6c908ba368622e73263172b2896f2575368499aad445ab0fc2129c43ae1385a5ee3adee1c4dd243d90d3d911
-
SSDEEP
384:m7EBb05b+XJoQgyksqKIHgwiKU+aouAGV9Rq2d:mzBQgHFiK3Gvg
Behavioral task
behavioral1
Sample
razrusheniye.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
razrusheniye.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Users\Admin\Videos\README.txt
Extracted
C:\Users\Admin\Pictures\Camera Roll\README.txt
Targets
-
-
Target
razrusheniye.exe
-
Size
21KB
-
MD5
916b310031e147c6258f89b8727cdac8
-
SHA1
a16f36eccd471ce2c4cee9388949b7a648e3bacd
-
SHA256
0af088e71cd40a89584020f9cb5080c85b6e859bafd866710dadda6438d1cb74
-
SHA512
1197774e65e0e7251692395c5a58f466f5aa1eac6c908ba368622e73263172b2896f2575368499aad445ab0fc2129c43ae1385a5ee3adee1c4dd243d90d3d911
-
SSDEEP
384:m7EBb05b+XJoQgyksqKIHgwiKU+aouAGV9Rq2d:mzBQgHFiK3Gvg
Score10/10-
Renames multiple (4325) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops file in Drivers directory
-
Boot or Logon Autostart Execution: Print Processors
Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.
-
Drops startup file
-
Drops file in System32 directory
-