General
-
Target
0cf5491278c7d87e8c3fc88c7f9f26ff.bin
-
Size
324KB
-
Sample
250414-bcw3hawms7
-
MD5
84d74b3fd9ff1393c900abeb2b11e5cc
-
SHA1
0f291851d5bcdae7796d3835a5117566cf2fe410
-
SHA256
5f4817219131e33567ece753af986f600a5b51d22d50de5ac80765cf817a9eff
-
SHA512
f77b59c8cfd0764644939979e2e1a0ebc6c107eb5048fd6720b00b139df252bb23cf2b079e11736593ff9bcd6b0723c9e706137a5f4b11f0d8e779393903e9f2
-
SSDEEP
6144:aEj/YCKXQyt+pjDyMKfQobbP7gE/Gi6VHs2/iPQpf+J9tU6TpKEAFM:5bYCKrGjDyMoQ0j7faMVQpfOtU7EsM
Static task
static1
Behavioral task
behavioral1
Sample
9ddb239d7c1ca00e5cf13cd6b1f816bdba30792b1f26cef2ca807336bd0b3802.exe
Resource
win10v2004-20250313-en
Malware Config
Targets
-
-
Target
9ddb239d7c1ca00e5cf13cd6b1f816bdba30792b1f26cef2ca807336bd0b3802.exe
-
Size
908KB
-
MD5
0cf5491278c7d87e8c3fc88c7f9f26ff
-
SHA1
db1d9f161f331d07bbb626acf7d4f8f6e1a2c742
-
SHA256
9ddb239d7c1ca00e5cf13cd6b1f816bdba30792b1f26cef2ca807336bd0b3802
-
SHA512
6bda8ea0fe42eb032d0c81e49e7c1a3d8d321185615bae41aca265b53d63191274c8ec6b646663668ab78d4b4ed5986ca73fcd85c2e212cde075d324f5a2c66f
-
SSDEEP
6144:xcQQbTJ0huBKxmueLQ320SlmQ2Gz3bJo47/T8MF3KSUEtQGG4P4T:bqLQ320SlmQ2GzW47vKSry14P
-
Detects Rhysida ransom note
-
Rhysida family
-
Renames multiple (9639) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Deletes itself
-
Drops startup file
-
Loads dropped DLL
-