General
-
Target
8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.zip
-
Size
74KB
-
Sample
250126-tdlx2axjcm
-
MD5
6b0a0046932cd2db225b2ae9239b0987
-
SHA1
f9298df0d5bb1ef598c396e2f23045761471e52d
-
SHA256
4815197a32fd49ba3f6cb23f48ceb1d4a68f7a2de1bd23471190f2ab39412e9d
-
SHA512
0bced4b9b296cb8195e7b6c67e6491889e7de9c92d6388709072317b8695add019d2061ff3737df81cf755fed19baad99ee05efd2785620650e5fe9e640de5d2
-
SSDEEP
1536:1nj1JUJyoAlO/dysSG81LXX5hSr9RwFzzAdm2HeeIQ315k:lrNomO/dysU1zXOr9CXUHvRl5k
Static task
static1
Behavioral task
behavioral1
Sample
8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe
-
Size
144KB
-
MD5
89895cf4c88f13e5797aab63dddf1078
-
SHA1
1efc175983a17bd6c562fe7b054045d6dcb341e5
-
SHA256
8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a
-
SHA512
d238fa264ad931ed43798a65f01cbe1d044300dbe5312bdcef8540f2757079514daae27f30f2369b7b811a3273c961f9fd38e7ae5010c11120c83906e8c102e2
-
SSDEEP
3072:eOFqYZEtiRjB+OpBmUHkRCBMmn3T/znyS4:eO8xwjBx8UHkt2DJ4
-
Ryuk family
-
Renames multiple (7669) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Executes dropped EXE
-
Modifies file permissions
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1