General
-
Target
2dd2c201103ac3a5bf77ae7b30d0032ed215f59f883543c816e516ab454383fb
-
Size
92KB
-
Sample
200911-hxmb8vs5gj
-
MD5
d8a91b5c1b1b5bc4d03913cbbed21423
-
SHA1
4bf92cc6ff9b43ea6c57311dddd769d32bd4afd9
-
SHA256
2dd2c201103ac3a5bf77ae7b30d0032ed215f59f883543c816e516ab454383fb
-
SHA512
447d8fc276b9a69ecd2f555e6b1375a6933a693019f49b9ac6b46a8b3520fe06ca721fba0d78289a275fde53a4cebfb38745521f0db47ce4d2af09f78dc08180
Static task
static1
Behavioral task
behavioral1
Sample
2dd2c201103ac3a5bf77ae7b30d0032ed215f59f883543c816e516ab454383fb.exe
Resource
win7
Behavioral task
behavioral2
Sample
2dd2c201103ac3a5bf77ae7b30d0032ed215f59f883543c816e516ab454383fb.exe
Resource
win10v200722
Malware Config
Extracted
C:\Users\Admin\Desktop\FILES ENCRYPTED.txt
batman12345@tutanota.com
Drman123@protonmail.com
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
batman12345@tutanota.com
Drman123@protonmail.com
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
batman12345@tutanota.com
Drman123@protonmail.com
Targets
-
-
Target
2dd2c201103ac3a5bf77ae7b30d0032ed215f59f883543c816e516ab454383fb
-
Size
92KB
-
MD5
d8a91b5c1b1b5bc4d03913cbbed21423
-
SHA1
4bf92cc6ff9b43ea6c57311dddd769d32bd4afd9
-
SHA256
2dd2c201103ac3a5bf77ae7b30d0032ed215f59f883543c816e516ab454383fb
-
SHA512
447d8fc276b9a69ecd2f555e6b1375a6933a693019f49b9ac6b46a8b3520fe06ca721fba0d78289a275fde53a4cebfb38745521f0db47ce4d2af09f78dc08180
Score10/10-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops startup file
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-
Modifies service
-