General
-
Target
https://www.virustotal.com/gui/home/url
-
Sample
250323-bp9t5avyfw
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.virustotal.com/gui/home/url
Resource
win10v2004-20250314-en
27 signatures
150 seconds
Malware Config
Extracted
Path
C:\Users\README_HOW_TO_UNLOCK.TXT
Ransom Note
YOUR FILE HAS BEEN LOCKED
In order to unlock your files, follow the instructions bellow:
1. Download and install Tor Browser
2. After a successful installation, run Tor Browser and wait for its initialization.
3. Type in the address bar: http://zvnvp2rhe3ljwf2m.onion
4. Follow the instructions on the site.
URLs
http://zvnvp2rhe3ljwf2m.onion
Targets
-
-
Target
https://www.virustotal.com/gui/home/url
-
Cryptolocker family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (63) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-