General
-
Target
2025-03-20_88cd426be100a17756f2ff09fbb790bb_mailto
-
Size
69KB
-
Sample
250320-a2173sysbs
-
MD5
88cd426be100a17756f2ff09fbb790bb
-
SHA1
339df90f848d5394fcf0d68d70e89a9c7852915e
-
SHA256
e6385e24bf9a458a6e8040c0778c55d1db3f403a40ba800c124fe7851eb2c12b
-
SHA512
faa9af7a3104c03a34672625a36404ddd6a1e6db68a5d7732c47c3f3e94885b9555fed268677bf7fe3d9579b84e66a2d3980df433507bf2d74dda04262a70066
-
SSDEEP
1536:cuCWRxL7hbUiQfovePbUU+hhOZuIWiFp+ZfaBZebC33O+6wc:XCWf7VJQfmePbvkhOZu1iFBBZebC3o
Behavioral task
behavioral1
Sample
2025-03-20_88cd426be100a17756f2ff09fbb790bb_mailto.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-20_88cd426be100a17756f2ff09fbb790bb_mailto.exe
Resource
win10v2004-20250313-en
Malware Config
Extracted
C:\ProgramData\Microsoft\OfficeSoftwareProtectionPlatform\Cache\29B4D4-Readme.txt
https://photos.app.goo.gl/LBMfnb3wZ9gp4uL58
http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion
http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion
Extracted
C:\Users\Public\Libraries\3AC8D3-Readme.txt
https://photos.app.goo.gl/LBMfnb3wZ9gp4uL58
http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion
http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion
Targets
-
-
Target
2025-03-20_88cd426be100a17756f2ff09fbb790bb_mailto
-
Size
69KB
-
MD5
88cd426be100a17756f2ff09fbb790bb
-
SHA1
339df90f848d5394fcf0d68d70e89a9c7852915e
-
SHA256
e6385e24bf9a458a6e8040c0778c55d1db3f403a40ba800c124fe7851eb2c12b
-
SHA512
faa9af7a3104c03a34672625a36404ddd6a1e6db68a5d7732c47c3f3e94885b9555fed268677bf7fe3d9579b84e66a2d3980df433507bf2d74dda04262a70066
-
SSDEEP
1536:cuCWRxL7hbUiQfovePbUU+hhOZuIWiFp+ZfaBZebC33O+6wc:XCWf7VJQfmePbvkhOZu1iFBBZebC3o
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (7440) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself
-