General
-
Target
RNSM00264.7z
-
Size
56.8MB
-
Sample
250224-3ccgmstmx8
-
MD5
aebeddadf5d1bf3d6bf63c8b06a6063d
-
SHA1
c6351a70408845884dc43ebac2eb734313f34446
-
SHA256
253dab229ca405a8bfb225b38679aa47975a5dcfd3d98ee202140e2f2a40bb72
-
SHA512
d1a68451a50e9e2e15ced0658b30adfc49b05d18e86e70730811dc1e0a4b97eafbb65eb5ebefe10eb2d9b7e30db480d136a7500099000cf1735f10b68535a410
-
SSDEEP
1572864:5mFL5w8AnHt2922jTstBaCy03akEgjmfYy9lsmprGJ+s9:IWhHt2922jTstBa8akEgiYYsmpo+s9
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00264.7z
Resource
win10v2004-20250217-en
Malware Config
Extracted
njrat
0.7d
HacKed
rundll32.hopto.org:5552
7fb49cec2da6d08e8721e67c0a84cf68
-
reg_key
7fb49cec2da6d08e8721e67c0a84cf68
-
splitter
|'|'|
Extracted
C:\Program Files\7-Zip\Lang\_RECoVERY_+lfhbu.txt
teslacrypt
http://yyre45dbvn2nhbefbmh.begumvelic.at/BF66BC39531A969
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/BF66BC39531A969
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/BF66BC39531A969
http://xlowfznrg4wf7dli.ONION/BF66BC39531A969
Targets
-
-
Target
RNSM00264.7z
-
Size
56.8MB
-
MD5
aebeddadf5d1bf3d6bf63c8b06a6063d
-
SHA1
c6351a70408845884dc43ebac2eb734313f34446
-
SHA256
253dab229ca405a8bfb225b38679aa47975a5dcfd3d98ee202140e2f2a40bb72
-
SHA512
d1a68451a50e9e2e15ced0658b30adfc49b05d18e86e70730811dc1e0a4b97eafbb65eb5ebefe10eb2d9b7e30db480d136a7500099000cf1735f10b68535a410
-
SSDEEP
1572864:5mFL5w8AnHt2922jTstBaCy03akEgjmfYy9lsmprGJ+s9:IWhHt2922jTstBa8akEgiYYsmpo+s9
-
Detected Xorist Ransomware
-
Njrat family
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Teslacrypt family
-
Xorist family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Renames multiple (1141) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Adds policy Run key to start application
-
Contacts a large (546) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Account Manipulation
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Defense Evasion
Direct Volume Access
1Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
3File Deletion
3Modify Registry
4Discovery
Network Service Discovery
1Network Share Discovery
1Peripheral Device Discovery
1Permission Groups Discovery
1Local Groups
1Query Registry
3Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1