General
-
Target
3fa4a10d6132b2c7234726ce029c65ebdd605335bd29befd37118f23cec1afb3.zip
-
Size
5.7MB
-
Sample
241014-wctmlaxfnf
-
MD5
d58134f1d4f9f20e53b9f5f3c2850ceb
-
SHA1
25d420bb1ed4fc867ae63edfd56bc6fd4b99051f
-
SHA256
74cb24663009dd17c0ca2f8606c6d6b48ec0f68b9d147d632b2fe9fa361c4a7d
-
SHA512
0ad0487874cd990939886851c22340a7f9b7ada67cb6fa899a2506276dba4c29388a54b8f4baabe5cf32664e190f87381d1c0e7c286a00e999aff8399ea9d3a6
-
SSDEEP
98304:LfR+3uQtH4cvRDHiTcc3M9GLZwTwqnPCIFHY4DaFjCavYIccNd6n+u2elIR54:L5++W4cucJTwUCF4DiCkUwd6nT2elue
Behavioral task
behavioral1
Sample
df9498892ae72f611128c9a8bc57b93964f34cc235f5aaf57fe10fb2b3c69aa3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df9498892ae72f611128c9a8bc57b93964f34cc235f5aaf57fe10fb2b3c69aa3.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
df9498892ae72f611128c9a8bc57b93964f34cc235f5aaf57fe10fb2b3c69aa3
-
Size
13.4MB
-
MD5
1ce3b67e179c8420bd5b31e75b4427ca
-
SHA1
4090622f0eadc1b420aa5d55e31ca5cd45e05f12
-
SHA256
df9498892ae72f611128c9a8bc57b93964f34cc235f5aaf57fe10fb2b3c69aa3
-
SHA512
c708cc271fad1ecd29fccb010a34f54ba7b885d8827351a5d8be49f4781185248e789c3e35fa1c7862fdc0bf303e1d97f2585023e0b9fd14db3181f55d276f5f
-
SSDEEP
98304:aRqeZPPm0Rgmt7M17Lu1zdfj7zyg5oo5AZx8U8qPoBhLTlL4DQWVYHL9fu4h84MR:aMygJ9edfbhSo5Kp8qPKlL8QgYVhqn
Score10/10-
Renames multiple (1380) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1