General
-
Target
0461e6e8f234e00307331dae19d3512950bbf3cdf7a1ec32802dff62cc14c90c.zip
-
Size
562KB
-
Sample
241202-flyd5s1jex
-
MD5
be8d17952bcdf0bac1696e7f9d4fc337
-
SHA1
902f122bf960a82331505e82c143af91424db1fd
-
SHA256
0461e6e8f234e00307331dae19d3512950bbf3cdf7a1ec32802dff62cc14c90c
-
SHA512
79aea791aa8a43ae88bbb27501f09f16b6f63165481b4faa7357a3f037b59a012ec0444954df41f39eadcc02a1d77d34d17eafaad46b55b023e52f61e0950e84
-
SSDEEP
12288:7Mgw/UcFZJP2zC7ttD0ZgDn/rvPxemsMgw/UUZJP2z/jrEL0cAB3:7M2cF2zQpCgnc/M2U2znELHAB3
Behavioral task
behavioral1
Sample
0A6172B017F62EAA.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0A6172B017F62EAA.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\ProgramData\biobio ransmoware.txt
Targets
-
-
Target
0A6172B017F62EAA.exe
-
Size
137KB
-
MD5
b556893d6f0219bb98468f724aeb06cf
-
SHA1
540d6c29aa4a05564da6bf253fc46fc8793277f1
-
SHA256
a75d6bf3c8cf0fc45b368bd83200d141319c9c67033803a230bd3451a309edff
-
SHA512
3a9c8477dfec35af9e682e197c76a1c1e341cdd4f4c276d1c18beac9ff5b53da394eac8428e66921369a607cd75c2fb7e430466758df508d6974e59f7f901ae9
-
SSDEEP
3072:MLIQ8YzXEMZK1A2czbFk58x+o+EFz9/t2f65q8hn2bIoKb:MstYrEMw6Bxk5zOFNtgJiCUb
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (9092) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1