General
-
Target
687459d587df273184469f7e707c0e5db8fe4e3d4b15756d666891127851680b
-
Size
436KB
-
Sample
240918-nvjlcazdjj
-
MD5
b4df15b5126f301a65ebf0f775304503
-
SHA1
316fc5db758fea291078a23c97cdf6a9f653a2a5
-
SHA256
687459d587df273184469f7e707c0e5db8fe4e3d4b15756d666891127851680b
-
SHA512
e4af16f5234dc037069adccad866e9c794ae0d2bfcc871bfcbaaeeaa83d1060b966c500c1800e2650a3508d994a07d703198bb9c85481ce04b687437a1c565b5
-
SSDEEP
12288:12zncbhNipABJuK+OuGNkQ7UOklYaQdCSJKm4saHJdA:4ncbapGbZPdATYPyjJdA
Behavioral task
behavioral1
Sample
a864282fea5a536510ae86c77ce46f7827687783628e4f2ceb5bf2c41b8cd3c6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a864282fea5a536510ae86c77ce46f7827687783628e4f2ceb5bf2c41b8cd3c6.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
a864282fea5a536510ae86c77ce46f7827687783628e4f2ceb5bf2c41b8cd3c6.exe
-
Size
1.2MB
-
MD5
0c8e88877383ccd23a755f429006b437
-
SHA1
69b3d913a3967153d1e91ba1a31ebed839b297ed
-
SHA256
a864282fea5a536510ae86c77ce46f7827687783628e4f2ceb5bf2c41b8cd3c6
-
SHA512
ba5296a84b7107b293d1afd4752157edaa1a3f1059685ecad2ddea9b9221ee9c8092ce5cae6f2f6a4866e25ca0bf66dd3fbc0786b2a26cb708d2cd536dd85041
-
SSDEEP
24576:utP7hdO1s6Skscec1SgnyN9HPFCCNhQI6GOfaFVIVrYwcMavDiZn3m75/J7:gLO1qkscec0gnyN9HPFCCNSI6GOfaFVp
-
Detect Rhysida ransomware
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Renames multiple (732) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Hide Artifacts: Hidden Window
Windows that would typically be displayed when an application carries out an operation can be hidden.
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Window
1Ignore Process Interrupts
1Indicator Removal
1File Deletion
1Modify Registry
1