Technical Information
To ensure autorun and distribution
Modifies the following registry keys
- [<HKCU>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'SALTSHAKER RANSOMWARE' = '%TEMP%\SALTSHAKER.exe'
Creates the following files on removable media
- <Drive name for removable media>:\autorun.inf
- <Drive name for removable media>:\saltshaker.exe
Modifies file system
Creates the following files
- %TEMP%\saltshaker.exe
- C:\autorun.inf
- C:\saltshaker.exe
- D:\autorun.inf
- D:\saltshaker.exe
Network activity
Connects to
- 's1##.#onvertio.me':443
- 'x1.#.lencr.org':80
- 'r3.#.lencr.org':80
TCP
HTTP GET requests
- http://x1.#.lencr.org/
- http://r3.#.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRI2smg%2ByvTLU%2Fw3mjS9We3NfmzxAQUFC6zF7dYVsuuUAlA5h%2BvnYsUwsYCEgPvLbmVvZcAgd2bBfdfCzWQXA%3D%3D
Other
- 's1##.#onvertio.me':443
UDP
- DNS ASK s1##.#onvertio.me
- DNS ASK r3.#.lencr.org
- DNS ASK x1.#.lencr.org