General
-
Target
RNSM00423.7z
-
Size
51.9MB
-
Sample
241027-tltylszfll
-
MD5
239ccbce50c59713e3c466367b787691
-
SHA1
fcec0a4eb1626ecbda7c018040a386e1721cc83d
-
SHA256
4f848bba2e46afeb3ea7e05989ce079d72840b35449625c956b83ba12234e92d
-
SHA512
f94370f2588c1627b3796b731f237b681f75c4c6ae197d4ace6d44659fb74e73922b5109ab7e204867e4177278787d7045c6e69763afeed2f0ae6831db955bcf
-
SSDEEP
1572864:/LHP6QVWDjQhUxRoCuhsVIoRNzps5D1D99LkBAK5a:jHPZVckhQQsVTNKb1
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00423.7z
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Program Files\dotnet\Restore-My-Files.txt
lockbit
http://lockbit-decryptor.top/?BC76D224712A7481B8B2035393FAA5EE
http://lockbitks2tvnmwk.onion/?BC76D224712A7481B8B2035393FAA5EE
Extracted
bitrat
1.34
zwlknt25w6fs6ffnkllvutcepgp7mz6dsndkbki4l2fr27rnk7o4b7yd.onion:80
-
communication_password
81dc9bdb52d04dc20036dbd8313ed055
-
tor_process
TORBUILD
Extracted
F:\readme-warning.txt
makop
Targets
-
-
Target
RNSM00423.7z
-
Size
51.9MB
-
MD5
239ccbce50c59713e3c466367b787691
-
SHA1
fcec0a4eb1626ecbda7c018040a386e1721cc83d
-
SHA256
4f848bba2e46afeb3ea7e05989ce079d72840b35449625c956b83ba12234e92d
-
SHA512
f94370f2588c1627b3796b731f237b681f75c4c6ae197d4ace6d44659fb74e73922b5109ab7e204867e4177278787d7045c6e69763afeed2f0ae6831db955bcf
-
SSDEEP
1572864:/LHP6QVWDjQhUxRoCuhsVIoRNzps5D1D99LkBAK5a:jHPZVckhQQsVTNKb1
-
Bitrat family
-
Lockbit family
-
Makop family
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
ModiLoader Second Stage
-
Modifies boot configuration data using bcdedit
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-