General
-
Target
Fantom.zip
-
Size
164KB
-
Sample
241027-151zla1ndq
-
MD5
23951f15badb4b0a89f6bfc7811b0d4b
-
SHA1
91d0c8260a8d285fea969bd701c6eb5ab901fa53
-
SHA256
f545b85449ee3812dcb219f173f010b76378a84acd3e5bbe1e7b2e308bfd7c64
-
SHA512
a3bf31ce8fb2b7dadf71a07e7765d110308aa419897f0a3dceb1e09be1c6322e69e043f500c5c3489388fcad4930a4795773bd2bbe2c232d5e8ca587b9beadf5
-
SSDEEP
3072:YsWGu6reSVacfSCgmzgtgXD6OOMe96MneBMOG/PVoj13KBMwIuGc/YYoj13KNsqR:K7ougpOL/saqkPV9FemLtcsDSsmw89p2
Static task
static1
Behavioral task
behavioral1
Sample
Fantom.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Fantom.zip
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\DECRYPT_YOUR_FILES.HTML
Extracted
C:\$Recycle.Bin\DECRYPT_YOUR_FILES.HTML
Extracted
C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\DECRYPT_YOUR_FILES.HTML
Extracted
C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\DECRYPT_YOUR_FILES.HTML
Targets
-
-
Target
Fantom.zip
-
Size
164KB
-
MD5
23951f15badb4b0a89f6bfc7811b0d4b
-
SHA1
91d0c8260a8d285fea969bd701c6eb5ab901fa53
-
SHA256
f545b85449ee3812dcb219f173f010b76378a84acd3e5bbe1e7b2e308bfd7c64
-
SHA512
a3bf31ce8fb2b7dadf71a07e7765d110308aa419897f0a3dceb1e09be1c6322e69e043f500c5c3489388fcad4930a4795773bd2bbe2c232d5e8ca587b9beadf5
-
SSDEEP
3072:YsWGu6reSVacfSCgmzgtgXD6OOMe96MneBMOG/PVoj13KBMwIuGc/YYoj13KNsqR:K7ougpOL/saqkPV9FemLtcsDSsmw89p2
-
Fantom family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (3019) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Disables Task Manager via registry modification
-
Drops file in Drivers directory
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-