General
-
Target
ec4f0c6f7901565b034991547d42de6f8afd71695fd28a15a4199e72575a8b0f.exe
-
Size
79KB
-
Sample
250205-tkyv6svrgl
-
MD5
7d578c616e075d7c5b1939a5a00a5b3d
-
SHA1
548b72daea1294f665a6bcebcb7e8b274fb7a8a5
-
SHA256
ec4f0c6f7901565b034991547d42de6f8afd71695fd28a15a4199e72575a8b0f
-
SHA512
0f9e5c7dd126b3b48e596247a053f6896f4d38ac4812d908cf87c9df592b02960e4ce6a6ab82854f920c46f9c4543e8b17c785bf469b5b71623af2616329e65d
-
SSDEEP
1536:/tUknV9M6+ygXCNoNGtmFWZPhV8owtnMQPo9NSw249gdhwA2jeddCL:fCygXkoNGtmQZ5wbAzSm9gdhj2aML
Static task
static1
Behavioral task
behavioral1
Sample
ec4f0c6f7901565b034991547d42de6f8afd71695fd28a15a4199e72575a8b0f.exe
Resource
win7-20240903-en
Malware Config
Extracted
C:\Users\Public\YOUR_FILES_ARE_ENCRYPTED.TXT
http://golden5a4eqranh7.onion/nU6bstiu
http://goldeny4vs3nyoht.onion/nU6bstiu
Extracted
C:\Users\Public\YOUR_FILES_ARE_ENCRYPTED.TXT
http://golden5a4eqranh7.onion/t3oeuyY8
http://goldeny4vs3nyoht.onion/t3oeuyY8
Targets
-
-
Target
ec4f0c6f7901565b034991547d42de6f8afd71695fd28a15a4199e72575a8b0f.exe
-
Size
79KB
-
MD5
7d578c616e075d7c5b1939a5a00a5b3d
-
SHA1
548b72daea1294f665a6bcebcb7e8b274fb7a8a5
-
SHA256
ec4f0c6f7901565b034991547d42de6f8afd71695fd28a15a4199e72575a8b0f
-
SHA512
0f9e5c7dd126b3b48e596247a053f6896f4d38ac4812d908cf87c9df592b02960e4ce6a6ab82854f920c46f9c4543e8b17c785bf469b5b71623af2616329e65d
-
SSDEEP
1536:/tUknV9M6+ygXCNoNGtmFWZPhV8owtnMQPo9NSw249gdhwA2jeddCL:fCygXkoNGtmQZ5wbAzSm9gdhj2aML
-
Seon
The Seon Ransomware is an encryption ransomware Trojan first observed on November 14, 2018.
-
Seon family
-
Renames multiple (262) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE
-
Loads dropped DLL
-