General
-
Target
53cee5760768d57218ccc210948592f29d41b98cba17a81a87d0392e1eeffaf6
-
Size
92KB
-
Sample
200911-k11hyv7sl6
-
MD5
b3b2021645e12446deb9ae6f0ddfed71
-
SHA1
dc59ba64bda2201de8cffc7e8d4696f0a3d5f930
-
SHA256
53cee5760768d57218ccc210948592f29d41b98cba17a81a87d0392e1eeffaf6
-
SHA512
e472625a05c239e058d9daaeff2f9e26a3c28a994d55995793e3190f6375af69133e550076b1e1cb93e63681dd54224cd0ca4c38a0e4f6b78a5fddc5b7959cbf
Static task
static1
Behavioral task
behavioral1
Sample
53cee5760768d57218ccc210948592f29d41b98cba17a81a87d0392e1eeffaf6.exe
Resource
win7
Behavioral task
behavioral2
Sample
53cee5760768d57218ccc210948592f29d41b98cba17a81a87d0392e1eeffaf6.exe
Resource
win10v200722
Malware Config
Extracted
C:\Users\Admin\Desktop\FILES ENCRYPTED.txt
FileEnc@protonmail.com
FileDec@protonmail.com
Extracted
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
FileEnc@protonmail.com
FileDec@protonmail.com
Targets
-
-
Target
53cee5760768d57218ccc210948592f29d41b98cba17a81a87d0392e1eeffaf6
-
Size
92KB
-
MD5
b3b2021645e12446deb9ae6f0ddfed71
-
SHA1
dc59ba64bda2201de8cffc7e8d4696f0a3d5f930
-
SHA256
53cee5760768d57218ccc210948592f29d41b98cba17a81a87d0392e1eeffaf6
-
SHA512
e472625a05c239e058d9daaeff2f9e26a3c28a994d55995793e3190f6375af69133e550076b1e1cb93e63681dd54224cd0ca4c38a0e4f6b78a5fddc5b7959cbf
Score10/10-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops startup file
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-
Modifies service
-