General
-
Target
HEUR-Trojan-Ransom.Win32.Generic-41c059f4dfaa143cc75df07f38f50d7d6ac0c6416d3e21aac2e530683c037fdf.7z
-
Size
1.5MB
-
Sample
250402-wcpzea1sfz
-
MD5
3290585e13e51afac3b0e2e17fc18212
-
SHA1
146f76cbdbf088fba0ca2bbe1efece22cebfa254
-
SHA256
712b77a8e132fdef3974b4ce3cf5da81ed98fc4ef3754c407c696922d662df02
-
SHA512
5612dc1ef3be15387a3217aeaa4291eb361b659e47d96c51259bae2c63efffd17523c3235ac859b31fdc452012679878105b14883c14542d74543ac44a13da10
-
SSDEEP
24576:hfGKRIF3Cr01NK5+2i5L5kr+NcgpMSlG6ZKzoQMgvxk2RG8+u:lNQ9t5L5y+mclG6ZixBr+u
Behavioral task
behavioral1
Sample
HEUR-Trojan-Ransom.Win32.Generic-41c059f4dfaa143cc75df07f38f50d7d6ac0c6416d3e21aac2e530683c037fdf.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
C:\ProgramData\Adobe\# M0rphine Help #.hta
<strong>[email protected]</strong>
Targets
-
-
Target
HEUR-Trojan-Ransom.Win32.Generic-41c059f4dfaa143cc75df07f38f50d7d6ac0c6416d3e21aac2e530683c037fdf.exe
-
Size
4.7MB
-
MD5
d2654d7085cfa021953f9a42c8057bba
-
SHA1
e86ad4024e568938ca94454f00d04a9303f5f7af
-
SHA256
41c059f4dfaa143cc75df07f38f50d7d6ac0c6416d3e21aac2e530683c037fdf
-
SHA512
2767f4ab916d58a0700d1df4933f6b8edb7d6e54ec9920a6b228ae1c130563942dbf4828e7ca9066fa71f1f195047a3b78a38e63ef67a0d8232f1599d4f00ea3
-
SSDEEP
98304:uvPbS1fekFplWVo9BvKg8MU9d0IK418OHcX:uvO1jUVB0IK4u
-
Satancryptor family
-
Renames multiple (2197) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Drops desktop.ini file(s)
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1