General
-
Target
7cb6f984f08296d33a4c316cf64ff96e352f07508a364b465a1a572bf73f4ad1
-
Size
146KB
-
Sample
241004-xpmkgsvgmd
-
MD5
23f8091893512fa2635817a2f51df391
-
SHA1
9f7f2ba48752e37baadd4c35febaa58d613e3194
-
SHA256
7cb6f984f08296d33a4c316cf64ff96e352f07508a364b465a1a572bf73f4ad1
-
SHA512
b4b9fc55bb944c8c657cf737ba0c8de17a09ec121591faac468b9c89182d45d910301f248d78134d78504de437a124208b6038a0047503f65e6cd1125490755c
-
SSDEEP
1536:wzICS4AAwczUUf8y8gvMH+1zGSNAojMP95D1xDY4zGqaGKGcNY3XZ2Vsz1bl8HXo:PqJogYkcSNm9V7DLzxaGb522l83qtZT
Behavioral task
behavioral1
Sample
7cb6f984f08296d33a4c316cf64ff96e352f07508a364b465a1a572bf73f4ad1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7cb6f984f08296d33a4c316cf64ff96e352f07508a364b465a1a572bf73f4ad1.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\mqmQaLLxg.README.txt
328N9mKT6xFe6uTvtpxeKSymgWCbbTGbK2
Targets
-
-
Target
7cb6f984f08296d33a4c316cf64ff96e352f07508a364b465a1a572bf73f4ad1
-
Size
146KB
-
MD5
23f8091893512fa2635817a2f51df391
-
SHA1
9f7f2ba48752e37baadd4c35febaa58d613e3194
-
SHA256
7cb6f984f08296d33a4c316cf64ff96e352f07508a364b465a1a572bf73f4ad1
-
SHA512
b4b9fc55bb944c8c657cf737ba0c8de17a09ec121591faac468b9c89182d45d910301f248d78134d78504de437a124208b6038a0047503f65e6cd1125490755c
-
SSDEEP
1536:wzICS4AAwczUUf8y8gvMH+1zGSNAojMP95D1xDY4zGqaGKGcNY3XZ2Vsz1bl8HXo:PqJogYkcSNm9V7DLzxaGb522l83qtZT
Score10/10-
Renames multiple (5363) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-