004681b1...bc6f | VMRay Analyzer Report
Try VMRay Analyzer
VTI SCORE: 100/100
Dynamic Analysis Report
Classification: Ransomware

VMRay Threat Indicators (7 rules, 13 matches)

Severity Category Operation Count Classification
5/5
Local AV Malicious content was detected by heuristic scan 1 -
4/5
File System Renames user files 1 Ransomware
  • Renames multiple user files. This is an indicator for an encryption attempt.
4/5
File System Modifies content of user files 1 Ransomware
  • Modifies the content of multiple user files. This is an indicator for an encryption attempt.
1/5
Masquerade Changes folder appearance 7 -
  • Folder "c:\users\5p5nrgjn0js halpmcxz\contacts" has a changed appearance.
  • Folder "c:\users\5p5nrgjn0js halpmcxz\downloads" has a changed appearance.
  • Folder "c:\users\5p5nrgjn0js halpmcxz\links" has a changed appearance.
  • Folder "c:\users\5p5nrgjn0js halpmcxz\music" has a changed appearance.
  • Folder "c:\users\5p5nrgjn0js halpmcxz\pictures" has a changed appearance.
  • Folder "c:\users\5p5nrgjn0js halpmcxz\saved games" has a changed appearance.
  • Folder "c:\users\5p5nrgjn0js halpmcxz\searches" has a changed appearance.
1/5
Device Monitors mouse movements and clicks 1 -
  • Frequently reads the state of a mouse button by API.
1/5
File System Creates an unusually large number of files 1 -
1/5
Static Unparsable sections in file 1 -
  • Static analyzer was unable to completely parse the analyzed file: C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\ZERO-FUCKS.exe.

Screenshots

Monitored Processes

Sample Information

ID #108686
MD5 1835b807fb780925edac1713152af8e4 Copy to Clipboard
SHA1 281e158aa5ea80c078c613b40a7d5b59e2213625 Copy to Clipboard
SHA256 004681b169f5a589434b90e4fde5f29392074442e702446c76f93b5809e3bc6f Copy to Clipboard
SSDeep 12288:96ATiRalbxAm2nuemYozvCHlewe7lih2EwFRZL9cwTE/sx/sUrDx:96ioWDDEE+cssxEUp Copy to Clipboard
ImpHash f34d5f2d4577ed6d9ceec516c1f5a744 Copy to Clipboard
Filename ZERO-FUCKS.exe
File Size 708.50 KB
Sample Type Windows Exe (x86-32)

Analysis Information

Creation Time 2019-07-15 04:10 (UTC+2)
Analysis Duration 00:02:42
Number of Monitored Processes 1
Execution Successful True
Reputation Enabled True
WHOIS Enabled False
Local AV Enabled True
YARA Enabled True
Number of AV Matches 1
Number of YARA Matches 0
Termination Reason Maximum binlog size reached
Tags
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image