General
-
Target
11cfd8e84704194ff9c56780858e9bbb9e82ff1b958149d74c43969d06ea10bd.exe
-
Size
142KB
-
Sample
241120-njvt8swmat
-
MD5
092d39b97288886203fa681bb354cca3
-
SHA1
baa44b68d92836d9005c6829d6d4891d39e1471d
-
SHA256
11cfd8e84704194ff9c56780858e9bbb9e82ff1b958149d74c43969d06ea10bd
-
SHA512
7b77a63b635477bf88934983fabf4103d94aefc95986f4c66df3a74ede2349a6d8c9442f38417dcd5518231ed42104c33273229b3d99c92250cacfd6623c5b47
-
SSDEEP
3072:uA5ohBykv/QGvx4TOPu5XH4KoUu2JsaO0xiQhzNHaGV:DojR/QY4CP434KrtOiJHFV
Static task
static1
Behavioral task
behavioral1
Sample
11cfd8e84704194ff9c56780858e9bbb9e82ff1b958149d74c43969d06ea10bd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
11cfd8e84704194ff9c56780858e9bbb9e82ff1b958149d74c43969d06ea10bd.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\INC-README.txt
inc_ransom
http://incpaysp74dphcbjyvg2eepxnl3tkgt5mq5vd4tnjusoissz342bdnad.onion/
http://incblog7vmuq7rktic73r4ha4j757m3ptym37tyvifzp2roedyyzzxid.onion/
Targets
-
-
Target
11cfd8e84704194ff9c56780858e9bbb9e82ff1b958149d74c43969d06ea10bd.exe
-
Size
142KB
-
MD5
092d39b97288886203fa681bb354cca3
-
SHA1
baa44b68d92836d9005c6829d6d4891d39e1471d
-
SHA256
11cfd8e84704194ff9c56780858e9bbb9e82ff1b958149d74c43969d06ea10bd
-
SHA512
7b77a63b635477bf88934983fabf4103d94aefc95986f4c66df3a74ede2349a6d8c9442f38417dcd5518231ed42104c33273229b3d99c92250cacfd6623c5b47
-
SSDEEP
3072:uA5ohBykv/QGvx4TOPu5XH4KoUu2JsaO0xiQhzNHaGV:DojR/QY4CP434KrtOiJHFV
-
Inc_ransom family
-
Renames multiple (396) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-