General
-
Target
21482936146.zip
-
Size
97KB
-
Sample
250219-m3g7tazjgw
-
MD5
5f80a4b666fa83f69743446c1d46e397
-
SHA1
f480eff43489fe5fbdfd2efb1f0583268a429747
-
SHA256
616c3a855e903eee9aeeaa793dd07c3c8212ca2e06d25406788112a427a439d6
-
SHA512
ef032a32bea88272ba6b6cdc14f28fab74fdb474665427db258401e86652243fc1141723d3495b22516bb98862e429e5195b75dc3733ae698fedb1ecee5d4f8d
-
SSDEEP
1536:6KgxqpdtAoThB0iV+Z0ZIovTdMYusNLv1Wv5fF+pEvTDvP+W82+/m3HrLp90:6ydtDThBYULvCYuGv4RApATDuE+u3HE
Behavioral task
behavioral1
Sample
59037088830d5b220be4d5f95b0bd19a88415318b10957907b3b49f41371a9c5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
59037088830d5b220be4d5f95b0bd19a88415318b10957907b3b49f41371a9c5.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
C:\WZBIlSNPn.README.txt
Targets
-
-
Target
59037088830d5b220be4d5f95b0bd19a88415318b10957907b3b49f41371a9c5
-
Size
147KB
-
MD5
3ae57223b24366ece408d64396fd2b90
-
SHA1
1d8a520fdb33fe94c131c56015f1e6799115210b
-
SHA256
59037088830d5b220be4d5f95b0bd19a88415318b10957907b3b49f41371a9c5
-
SHA512
0d088480156d784c7b0bf0e851f6140bd1e51a1c6cf1f3bfabc8fbcbed4bddca8545299810e65fa3bb05f4e7b0dcbe19dd90b252c66841cf38bf786005239711
-
SSDEEP
3072:vqJogYkcSNm9V7Dk961CuNtH3nx3wHIT:vq2kc4m9tDk9YNtXx3wH
Score10/10-
Renames multiple (363) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-