General
-
Target
Batch_1.zip
-
Size
13.3MB
-
Sample
250103-qdr79sykfn
-
MD5
19090d44d59052a2c0747280fadc7f92
-
SHA1
25162ddae11d4f21729418d6f5e43c8fd035de68
-
SHA256
e9b99706a9b48b09974dd18c1af8a0e402ccddcaa0c91edf43fdd838128a7408
-
SHA512
9168cb1b97bf680b5be065852486b51c38cd134ec2aebe97bc0a6a4b681a226cf83013e012de1e0402e44369fc6c1ed95068f94ab6e21b4dbba91606f95f9800
-
SSDEEP
393216:17+hcOnO654Z2D2suR0212iUS8EgAoHBM9a6h2BS8uO:EZzuZu5uR0IRnyHBMIvYO
Behavioral task
behavioral1
Sample
08cf8ed94cc1ef6ae23133f3e506a50d8aad9047c6fa74568a0373d991261aa4.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\FILES.TXT
Targets
-
-
Target
08cf8ed94cc1ef6ae23133f3e506a50d8aad9047c6fa74568a0373d991261aa4.exe
-
Size
727KB
-
MD5
d13f890034a68ccb4af4e0bf51e2b5ec
-
SHA1
84afde24c913c007b0c0490041b61877aa254737
-
SHA256
08cf8ed94cc1ef6ae23133f3e506a50d8aad9047c6fa74568a0373d991261aa4
-
SHA512
0065844527f3a3556bc50705f9d5608561a04e95a2d99b1a262db1094ca188425ef69f02f801eab2eaf74e14e027ceebb471a754192e195e51b6c57d3d7d45ce
-
SSDEEP
12288:jk2624GHVUBOSRVrHZfiZHJ2HFO/9xwrPgWyzZp+L7vN3:H6+VUBraeF8/tSh
-
Clears Windows event logs
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Drops desktop.ini file(s)
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Direct Volume Access
1Indicator Removal
4Clear Windows Event Logs
1File Deletion
3Modify Registry
1