General
-
Target
0cb4e7d35eb3f4585c6168988247e30d99ef24d3ef006d91971e3913ef593c42
-
Size
1.9MB
-
Sample
241121-jfh9tazald
-
MD5
acfa0c2374d79ee81b52d83625bc0c51
-
SHA1
3a21939a08d8692f143489c70e30cb3e76401e3b
-
SHA256
0cb4e7d35eb3f4585c6168988247e30d99ef24d3ef006d91971e3913ef593c42
-
SHA512
afc9e40309a8a56138597b2d2c18f0ef4ef380e1856549feb27d66d223fdfdd530baf859cb2ad298db6436f5ed0ac46574a3723ac025e7d02736c3b761a0efaa
-
SSDEEP
24576:RZ1xu7ZRX2iox4quwo63lUlWPpnx/YUP6BTOVEExGO5AgPxVERXBL61X8WdooBwv:aZAioEG1wUP6BTO2oGuJFqWykoAe6Xy
Static task
static1
Behavioral task
behavioral1
Sample
0cb4e7d35eb3f4585c6168988247e30d99ef24d3ef006d91971e3913ef593c42.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0cb4e7d35eb3f4585c6168988247e30d99ef24d3ef006d91971e3913ef593c42.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
F:\INC-README.txt
inc_ransom
http://incpaysp74dphcbjyvg2eepxnl3tkgt5mq5vd4tnjusoissz342bdnad.onion/
http://incblog7vmuq7rktic73r4ha4j757m3ptym37tyvifzp2roedyyzzxid.onion/
Targets
-
-
Target
0cb4e7d35eb3f4585c6168988247e30d99ef24d3ef006d91971e3913ef593c42
-
Size
1.9MB
-
MD5
acfa0c2374d79ee81b52d83625bc0c51
-
SHA1
3a21939a08d8692f143489c70e30cb3e76401e3b
-
SHA256
0cb4e7d35eb3f4585c6168988247e30d99ef24d3ef006d91971e3913ef593c42
-
SHA512
afc9e40309a8a56138597b2d2c18f0ef4ef380e1856549feb27d66d223fdfdd530baf859cb2ad298db6436f5ed0ac46574a3723ac025e7d02736c3b761a0efaa
-
SSDEEP
24576:RZ1xu7ZRX2iox4quwo63lUlWPpnx/YUP6BTOVEExGO5AgPxVERXBL61X8WdooBwv:aZAioEG1wUP6BTO2oGuJFqWykoAe6Xy
-
Inc_ransom family
-
Renames multiple (178) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-