General
-
Target
b103fc649787eb1f6121df8174d0f16aaac736fb53f5f078d312871189285956.exe
-
Size
61KB
-
Sample
231012-t2z5kadg95
-
MD5
9eb958c38bd3d39c55b009f9a200f42f
-
SHA1
b5ab794dd5821d08f7ecd860ba7975a6644dd46d
-
SHA256
b103fc649787eb1f6121df8174d0f16aaac736fb53f5f078d312871189285956
-
SHA512
f7146fa64c8fe89eb4afb29af0b85e1693a03aeb38ae2948b8c047b4f1dd84817954563b6bd5ead4c4461242e1275c47ef4b41cf33fe9e3899dfe3952bc46954
-
SSDEEP
1536:Lo2RzBFN0Yr9dEmZ6sIF8ahn62Zq8qWwESmNHEgLufKOUmoEE4:LoMDN0Yr9dEm+yBIUEbNHEgLuiOUmoEl
Behavioral task
behavioral1
Sample
b103fc649787eb1f6121df8174d0f16aaac736fb53f5f078d312871189285956.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
b103fc649787eb1f6121df8174d0f16aaac736fb53f5f078d312871189285956.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
C:\Users\Admin\Documents\read_it.txt
https://paypal.me/GoldenWolf42
Targets
-
-
Target
b103fc649787eb1f6121df8174d0f16aaac736fb53f5f078d312871189285956.exe
-
Size
61KB
-
MD5
9eb958c38bd3d39c55b009f9a200f42f
-
SHA1
b5ab794dd5821d08f7ecd860ba7975a6644dd46d
-
SHA256
b103fc649787eb1f6121df8174d0f16aaac736fb53f5f078d312871189285956
-
SHA512
f7146fa64c8fe89eb4afb29af0b85e1693a03aeb38ae2948b8c047b4f1dd84817954563b6bd5ead4c4461242e1275c47ef4b41cf33fe9e3899dfe3952bc46954
-
SSDEEP
1536:Lo2RzBFN0Yr9dEmZ6sIF8ahn62Zq8qWwESmNHEgLufKOUmoEE4:LoMDN0Yr9dEm+yBIUEbNHEgLuiOUmoEl
Score10/10-
Chaos Ransomware
-
Renames multiple (173) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (208) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Sets desktop wallpaper using registry
-