General
-
Target
028d8a0f2eefdc87bcfde1457470789c.bin
-
Size
1.2MB
-
Sample
230307-bcwrqsge47
-
MD5
9073e7b7691076ad6e10095251c95b74
-
SHA1
8782beee1ecc5af445d382bd5de61b2dbbf6cb31
-
SHA256
2dfba8736422fd1f0d068c5729751cb63a648763ec6c333534bf9f4283c5bd3a
-
SHA512
75297e52b80650db02fed78c7cd73deeb7e87571b19efafbeecce949a9bf847bb6a23cc2c5942dc20ba513100d96a72133acabf1bd25cf4dab0a78f357342037
-
SSDEEP
24576:4oa2X/8O0WU05E82YKvkLvzI9hxx2qE9pPwyZZSRhFJzXnzydSZ:r8OlD5EzvkLvQl2l9pTZZSRhFlXed2
Behavioral task
behavioral1
Sample
a80908bcd96a8df6070eb9a9c83739c8d95c34d7d81b890bacda91bb05c53267.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a80908bcd96a8df6070eb9a9c83739c8d95c34d7d81b890bacda91bb05c53267.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\How to Recovery.bat
33j4JbAEzZwWGgA2MxBARD7zprJuNDP2hP
Targets
-
-
Target
a80908bcd96a8df6070eb9a9c83739c8d95c34d7d81b890bacda91bb05c53267.exe
-
Size
2.7MB
-
MD5
028d8a0f2eefdc87bcfde1457470789c
-
SHA1
a9f41548d827728e44cb0296b05ae23295698c46
-
SHA256
a80908bcd96a8df6070eb9a9c83739c8d95c34d7d81b890bacda91bb05c53267
-
SHA512
931b9ddeba173931968f80d144a3fd851236744c12212a6e723c88ffd7c720b7ec2538b655fe680a80c66d65a3ca541bcbbf3abfd1e353eef0dfb2fa3d9594f5
-
SSDEEP
24576:bvS4lQMNWi3VesNY8106qPN4K3P0QcejoMZLyiTtiFfkOfE:bvSy6PX3PpM+P5Id
Score10/10-
Chaos Ransomware
-
Modifies boot configuration data using bcdedit
-
Disables Task Manager via registry modification
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Sets desktop wallpaper using registry
-