General
-
Target
Dolphin.ini
-
Size
50B
-
Sample
250317-fz2cys1whx
-
MD5
c65f0a827d3445544eb211f91f034c40
-
SHA1
05fa6235b93939cbe7324d3df7333d5c5dbe7e49
-
SHA256
7f91e1e0839c047b1cbfb65f84d444dac70d3cd16f8e4f06ed7278bfe6212571
-
SHA512
63abc244862ed06c9f67b009b6c25994686cea8b7504112c46c4214843aa4a4b74a974e7279248f0e8f17a4b9b3cde54d4ee4345e422627e7895c9796c4824e0
Static task
static1
Behavioral task
behavioral1
Sample
Dolphin.ini
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
Dolphin.ini
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
Dolphin.ini
-
Size
50B
-
MD5
c65f0a827d3445544eb211f91f034c40
-
SHA1
05fa6235b93939cbe7324d3df7333d5c5dbe7e49
-
SHA256
7f91e1e0839c047b1cbfb65f84d444dac70d3cd16f8e4f06ed7278bfe6212571
-
SHA512
63abc244862ed06c9f67b009b6c25994686cea8b7504112c46c4214843aa4a4b74a974e7279248f0e8f17a4b9b3cde54d4ee4345e422627e7895c9796c4824e0
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-