General

  • Target

    4089e7b0a0469bd5877c830f962f8243dc1311349271e45e9b15cd6d97e0a2ea.bin.sample.gz

  • Size

    647KB

  • Sample

    220513-twhy4ahcb8

  • MD5

    0a75b835eded74ffbd8472e39b7b11c9

  • SHA1

    243c731934fb21f35f703638ddfe8da4a64cd8d8

  • SHA256

    f68fcf611ee0ae23db0159621daa088c0a7605169df99272fa7dd9036c396124

  • SHA512

    bf06e391c6f531cdf33e7e20c06926ed859a0bec50cf735421840f24057014f87999779c22a6df493c72117441444247f3d941d121935265e7147fd1fb0a010c

Malware Config

Targets

    • Target

      sample

    • Size

      1.4MB

    • MD5

      91cae6b4bbd4fbe83589e011495d9844

    • SHA1

      c3a768d10abb78f0909bfa5d2f05da39abf99fe2

    • SHA256

      4089e7b0a0469bd5877c830f962f8243dc1311349271e45e9b15cd6d97e0a2ea

    • SHA512

      90b37b1930b75cb7b74d0e18e327434842f8b1fa472f9c25a6f238ab7455282287eeef98dd9b0965d00761e9e0bca20073e7cde9e850e2f8071ad1eb8f6c761a

    • Chaos

      Ransomware family first seen in June 2021.

    • Chaos Ransomware

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies boot configuration data using bcdedit

    • Deletes backup catalog

      Uses wbadmin.exe to inhibit system recovery.

    • Disables Task Manager via registry modification

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks