General
-
Target
9a4e6b6a25332f21e4e15bd5c67ea1613db78bf02fa3cef2eba47f27723f8d58
-
Size
92KB
-
Sample
201109-yv1vrzhqxj
-
MD5
f552f5b23542b6ab3605cc51390b1d5f
-
SHA1
2d58e4981de5d73a36cd741b811e1741501cc4ec
-
SHA256
9a4e6b6a25332f21e4e15bd5c67ea1613db78bf02fa3cef2eba47f27723f8d58
-
SHA512
a45ef470e6992c2358845ccd1edf5969a0082089fecac33ade0e3685bbff288cf5d92428d5a94c4f9d5dfcf30bf2e13f65a2a04159d555ed915cf8133a6596fa
Static task
static1
Behavioral task
behavioral1
Sample
9a4e6b6a25332f21e4e15bd5c67ea1613db78bf02fa3cef2eba47f27723f8d58.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
9a4e6b6a25332f21e4e15bd5c67ea1613db78bf02fa3cef2eba47f27723f8d58.exe
Resource
win10v20201028
Malware Config
Extracted
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
newdecrypt@protonmail.com
Filesback@tutamail.com
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
newdecrypt@protonmail.com
Filesback@tutamail.com
Targets
-
-
Target
9a4e6b6a25332f21e4e15bd5c67ea1613db78bf02fa3cef2eba47f27723f8d58
-
Size
92KB
-
MD5
f552f5b23542b6ab3605cc51390b1d5f
-
SHA1
2d58e4981de5d73a36cd741b811e1741501cc4ec
-
SHA256
9a4e6b6a25332f21e4e15bd5c67ea1613db78bf02fa3cef2eba47f27723f8d58
-
SHA512
a45ef470e6992c2358845ccd1edf5969a0082089fecac33ade0e3685bbff288cf5d92428d5a94c4f9d5dfcf30bf2e13f65a2a04159d555ed915cf8133a6596fa
Score10/10-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops startup file
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-
Modifies service
-