General
-
Target
240626-rptqxa1ejn_pw_infected.zip
-
Size
66KB
-
Sample
250128-xlqgzayjgv
-
MD5
0c760c9af1439400edf0b47efd89db9e
-
SHA1
ace1b2fe04b22fdceb9a19553fa911d6871744fb
-
SHA256
7fd2e1a7ddff6be3ca2e6f04eaa12ed79581d3d76c3da7419aa793d128a724f0
-
SHA512
5c1a0a99e6547131a79a408e3d379ff3585b5ff0bb78193973f226befdbda87f4de39c7608979c8d573775c07dea38f5cca22fcdc72a16017306855b5a7e2327
-
SSDEEP
1536:Oo4cuqJrtMt7gt36E9lOwYlZ1mhJh1V3tFkdnJvSOvytg:5a8Z6w36E9oZo9Wd7qC
Static task
static1
Behavioral task
behavioral1
Sample
d6b7b27e13700aaa7f108bf9e76473717a7a1665198e9aafcc2d2227ca11bba9.exe
Resource
win7-20240903-es
Behavioral task
behavioral2
Sample
d6b7b27e13700aaa7f108bf9e76473717a7a1665198e9aafcc2d2227ca11bba9.exe
Resource
win10ltsc2021-20250128-es
Malware Config
Targets
-
-
Target
d6b7b27e13700aaa7f108bf9e76473717a7a1665198e9aafcc2d2227ca11bba9.exe
-
Size
131KB
-
MD5
2cc630e080bb8de5faf9f5ae87f43f8b
-
SHA1
5a385b8b4b88b6eb93b771b7fbbe190789ef396a
-
SHA256
d6b7b27e13700aaa7f108bf9e76473717a7a1665198e9aafcc2d2227ca11bba9
-
SHA512
901939718692e20a969887e64db581d6fed62c99026709c672edb75ebfa35ce02fa68308d70d463afbcc42a46e52ea9f7bc5ed93e5dbf3772d221064d88e11d7
-
SSDEEP
3072:j06qm9E8obCg2QdgYdrp23suV+eGg21Yg:j06qHnOg3df9eAJ
-
Ryuk family
-
Renames multiple (8297) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Modifies file permissions
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1