General
-
Target
KatyushaRansomware.bin
-
Size
2.4MB
-
Sample
240922-v17npa1fjr
-
MD5
7f87db33980c0099739de40d1b725500
-
SHA1
f0626999b7f730f9003ac1389d3060c50068da5a
-
SHA256
d00ee0e6eab686424f8d383e151d22005f19adbda5b380a75669629e32fe12a6
-
SHA512
1bf8e63a09ee7618102982a1d8c39c2eada1e7c52452d0cadb0df9010421799171880580dd6e4d5fb371d314ee7676d438ab827ef1695bb9de95835ac7cb47f8
-
SSDEEP
49152:tzlhgyBIjVpPZHZlPpLPk0vglJIAc/8KYBsxdO0G7x+dP1Y+:zy9jRZlFknvzcEKY8dOD7x8NY
Static task
static1
Behavioral task
behavioral1
Sample
KatyushaRansomware.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
KatyushaRansomware.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\_how_to_decrypt_you_files.txt
3ALmvAWLEothnMF5BjckAFaKB5S6zan9PK
https://www.bithumb.com/
http://www.coinone.com/
https://www.gopax.co.kr/
http://www.localbitcoins.com/
Extracted
C:\_how_to_decrypt_you_files.txt
3ALmvAWLEothnMF5BjckAFaKB5S6zan9PK
https://www.bithumb.com/
http://www.coinone.com/
https://www.gopax.co.kr/
http://www.localbitcoins.com/
Targets
-
-
Target
KatyushaRansomware.bin
-
Size
2.4MB
-
MD5
7f87db33980c0099739de40d1b725500
-
SHA1
f0626999b7f730f9003ac1389d3060c50068da5a
-
SHA256
d00ee0e6eab686424f8d383e151d22005f19adbda5b380a75669629e32fe12a6
-
SHA512
1bf8e63a09ee7618102982a1d8c39c2eada1e7c52452d0cadb0df9010421799171880580dd6e4d5fb371d314ee7676d438ab827ef1695bb9de95835ac7cb47f8
-
SSDEEP
49152:tzlhgyBIjVpPZHZlPpLPk0vglJIAc/8KYBsxdO0G7x+dP1Y+:zy9jRZlFknvzcEKY8dOD7x8NY
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (7516) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
mimikatz is an open source tool to dump credentials on Windows
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
1