General
-
Target
HEUR-Trojan-Ransom.Win32.Generic-41c059f4dfaa143cc75df07f38f50d7d6ac0c6416d3e21aac2e530683c037fdf.7z
-
Size
1.5MB
-
Sample
250402-wa1ywstmv4
-
MD5
3290585e13e51afac3b0e2e17fc18212
-
SHA1
146f76cbdbf088fba0ca2bbe1efece22cebfa254
-
SHA256
712b77a8e132fdef3974b4ce3cf5da81ed98fc4ef3754c407c696922d662df02
-
SHA512
5612dc1ef3be15387a3217aeaa4291eb361b659e47d96c51259bae2c63efffd17523c3235ac859b31fdc452012679878105b14883c14542d74543ac44a13da10
-
SSDEEP
24576:hfGKRIF3Cr01NK5+2i5L5kr+NcgpMSlG6ZKzoQMgvxk2RG8+u:lNQ9t5L5y+mclG6ZixBr+u
Behavioral task
behavioral1
Sample
HEUR-Trojan-Ransom.Win32.Generic-41c059f4dfaa143cc75df07f38f50d7d6ac0c6416d3e21aac2e530683c037fdf.7z
Resource
win10v2004-20250314-en
Malware Config
Extracted
zebrocy
Windows XP Professional x64 Edition
Extracted
C:\ProgramData\Adobe\# M0rphine Help #.hta
<strong>[email protected]</strong>
Targets
-
-
Target
HEUR-Trojan-Ransom.Win32.Generic-41c059f4dfaa143cc75df07f38f50d7d6ac0c6416d3e21aac2e530683c037fdf.7z
-
Size
1.5MB
-
MD5
3290585e13e51afac3b0e2e17fc18212
-
SHA1
146f76cbdbf088fba0ca2bbe1efece22cebfa254
-
SHA256
712b77a8e132fdef3974b4ce3cf5da81ed98fc4ef3754c407c696922d662df02
-
SHA512
5612dc1ef3be15387a3217aeaa4291eb361b659e47d96c51259bae2c63efffd17523c3235ac859b31fdc452012679878105b14883c14542d74543ac44a13da10
-
SSDEEP
24576:hfGKRIF3Cr01NK5+2i5L5kr+NcgpMSlG6ZKzoQMgvxk2RG8+u:lNQ9t5L5y+mclG6ZixBr+u
-
Satancryptor family
-
Zebrocy Go Variant
-
Zebrocy family
-
Renames multiple (2226) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1