General
-
Target
https://github.com/Da2dalus/The-MALWARE-Repo
-
Sample
250228-dj7tpaytey
Score
9/10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Da2dalus/The-MALWARE-Repo
Resource
win10ltsc2021-20250217-en
22 signatures
900 seconds
Malware Config
Targets
-
-
Target
https://github.com/Da2dalus/The-MALWARE-Repo
Score9/10-
Renames multiple (161) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-