General
-
Target
VirusShare0bb1f183dd4b8dc355b2bb434c8b1ab2
-
Size
587KB
-
Sample
240920-kg7jgaxejg
-
MD5
0bb1f183dd4b8dc355b2bb434c8b1ab2
-
SHA1
6fd0fe811ea54f139dc68202f52ebf969c2a5fff
-
SHA256
a05fcce3dc8cc69c9aedf90ac5442c18760e55db2ffc7b8d3c9fceeabe2c4d15
-
SHA512
7425a765f3f0411ad07796284ab35d4fc0b869772a52812e5d6295d0d895828b3c6ba2170cfd9e40323f4a8f71d0c4453a2776c6e85f2bf89c4e52668a6b9858
-
SSDEEP
6144:2WKcuMYrv1C4rhJDZTxDnWe6G+5HmEf/YS:2WKBD04rhrxnvufH
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare0bb1f183dd4b8dc355b2bb434c8b1ab2.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
VirusShare0bb1f183dd4b8dc355b2bb434c8b1ab2.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+ohxaf.txt
http://rbg4hfbilrf7to452p89hrfq.boonmower.com/852932D845F55BA
http://irhng84nfaslbv243ljtblwqjrb.pinnafaon.at/852932D845F55BA
http://t54ndnku456ngkwsudqer.wallymac.com/852932D845F55BA
http://xlowfznrg4wf7dli.onion/852932D845F55BA
Targets
-
-
Target
VirusShare0bb1f183dd4b8dc355b2bb434c8b1ab2
-
Size
587KB
-
MD5
0bb1f183dd4b8dc355b2bb434c8b1ab2
-
SHA1
6fd0fe811ea54f139dc68202f52ebf969c2a5fff
-
SHA256
a05fcce3dc8cc69c9aedf90ac5442c18760e55db2ffc7b8d3c9fceeabe2c4d15
-
SHA512
7425a765f3f0411ad07796284ab35d4fc0b869772a52812e5d6295d0d895828b3c6ba2170cfd9e40323f4a8f71d0c4453a2776c6e85f2bf89c4e52668a6b9858
-
SSDEEP
6144:2WKcuMYrv1C4rhJDZTxDnWe6G+5HmEf/YS:2WKBD04rhrxnvufH
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (398) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-