General
-
Target
PackedEncryptor.exe
-
Size
485KB
-
Sample
250126-r2taxatqcx
-
MD5
0f30d0d58dcc450cb0b05f1f84916cbb
-
SHA1
16033c2fe6c2149b8a23f5d7e01d30cdc73687b1
-
SHA256
14b9941d53f382c49d9ab75b8ec086210c17b19ffac0d071f462c4bfa8b5157a
-
SHA512
b101e4cd57fbe9e5b1636a9bac0b70f8cd3d4151b40b0c464dc9616fd192efee7e11458ce92d847b1e9879cb6f2eec17838f8d4b437a832c24cc504628d43ea3
-
SSDEEP
12288:syveQB/fTHIGaPkKEYzURNAgbAggkFLz8qd2:suDXTIGaPhEYzUzAktFX8x
Static task
static1
Behavioral task
behavioral1
Sample
PackedEncryptor.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PackedEncryptor.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\RlWCfyLxZ.README.txt
Targets
-
-
Target
PackedEncryptor.exe
-
Size
485KB
-
MD5
0f30d0d58dcc450cb0b05f1f84916cbb
-
SHA1
16033c2fe6c2149b8a23f5d7e01d30cdc73687b1
-
SHA256
14b9941d53f382c49d9ab75b8ec086210c17b19ffac0d071f462c4bfa8b5157a
-
SHA512
b101e4cd57fbe9e5b1636a9bac0b70f8cd3d4151b40b0c464dc9616fd192efee7e11458ce92d847b1e9879cb6f2eec17838f8d4b437a832c24cc504628d43ea3
-
SSDEEP
12288:syveQB/fTHIGaPkKEYzURNAgbAggkFLz8qd2:suDXTIGaPhEYzUzAktFX8x
-
Lockbit family
-
Rule to detect Lockbit 3.0 ransomware Windows payload
-
Renames multiple (321) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1