General
-
Target
20157085188.zip
-
Size
97KB
-
Sample
241203-k5yw8strbn
-
MD5
0d43612725b8e158b0e7667bb7c3356b
-
SHA1
090e1d93d6825e4ca818fc8cdc0f0fe1274c7b9b
-
SHA256
0774bab2acc20b6cf91669dd916f3ee0bd152919e2533a4bb0f04e0c2539da3b
-
SHA512
17532a9aed645f35d22f55e1ef6d9ed523a099c4d8011d9bd89f40eaca5f4c2f0099c517fb477edcecab42e4fb413715bfd7d8bff9ed57b9d75d6ee66820d57b
-
SSDEEP
1536:o2pNmVLzvffPgBN4H8oNd+HFXVWyVcNZVyNwCHBVKVqp4keiHh2k5Nx02DUYg:o2r6fA/43yhxwVyj4VKoiBR5f02wYg
Behavioral task
behavioral1
Sample
2ffd41be5a72da75b3de503e17bed058eb84e1e83be9e0b264cb987b4581259e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2ffd41be5a72da75b3de503e17bed058eb84e1e83be9e0b264cb987b4581259e.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\blADqpmVf.README.txt
Extracted
C:\blADqpmVf.README.txt
Targets
-
-
Target
2ffd41be5a72da75b3de503e17bed058eb84e1e83be9e0b264cb987b4581259e
-
Size
147KB
-
MD5
e3e89421797130de9f4edebdd1980522
-
SHA1
f3fad656375518254c520e5dc7d94a495443db7e
-
SHA256
2ffd41be5a72da75b3de503e17bed058eb84e1e83be9e0b264cb987b4581259e
-
SHA512
94d3670b2e2af3c18d4f441340973045bb9b658f401cf20e27b7376fdb4c37e7e8d2d39fa2f417536987957a5af7f81c44f433fa3cd392c288d852b427af38ec
-
SSDEEP
3072:h6glyuxE4GsUPnliByocWepKooaLxQ3Rmz:h6gDBGpvEByocWeD8Rm
Score10/10-
Renames multiple (342) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-