General
-
Target
tmp
-
Size
1MB
-
Sample
230922-leabmafc3x
-
MD5
ece588d72ef43b053748bb24d4f9955a
-
SHA1
5782364250b5ae8cc10a8aeb09f00826771b6891
-
SHA256
09c21b493bba180a3a735dd4d79bc0fce6242174732611b6e6156381e5a959b1
-
SHA512
7262cf3e8b1be2f73f5156f4ef3038b4eebe29a74d52ff7ecf0247bc32934741b358f81136cd76f0810359922bfcf9160c528b492308a4cf1c3a3c92c70fa852
-
SSDEEP
24576:Hd8UBpPOAyHniEYQnoxtKDAq2xeETAeAsoqqhV4Qdj+:98wpPVLExn8eEqtqqhV4Qd6
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
C:\Program Files\7-Zip\Lang\HOW TO BACK FILES.txt
mallox.resurrection@onionmail.org
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion/mallox/privateSignin
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion
Targets
-
-
Target
tmp
-
Size
1MB
-
MD5
ece588d72ef43b053748bb24d4f9955a
-
SHA1
5782364250b5ae8cc10a8aeb09f00826771b6891
-
SHA256
09c21b493bba180a3a735dd4d79bc0fce6242174732611b6e6156381e5a959b1
-
SHA512
7262cf3e8b1be2f73f5156f4ef3038b4eebe29a74d52ff7ecf0247bc32934741b358f81136cd76f0810359922bfcf9160c528b492308a4cf1c3a3c92c70fa852
-
SSDEEP
24576:Hd8UBpPOAyHniEYQnoxtKDAq2xeETAeAsoqqhV4Qdj+:98wpPVLExn8eEqtqqhV4Qd6
Score10/10-
Renames multiple (3611) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Modifies file permissions
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Indicator Removal
2File Deletion
2Impair Defenses
1File and Directory Permissions Modification
1Modify Registry
1