General
-
Target
80bf2731a81c113432f061b397d70cac72d907c39102513abe0f2bae079373e4
-
Size
4.0MB
-
Sample
231013-h7nsyaff5s
-
MD5
d59aa49740acb5e45ecb65da070035e3
-
SHA1
4086107b3fb71fb02361306da6099a85be97ae1d
-
SHA256
80bf2731a81c113432f061b397d70cac72d907c39102513abe0f2bae079373e4
-
SHA512
459805b020b78399fae8ac5e8ed439df1b8852519014029833794d2eaad1b1f2aecc3aaba99ae52a0881cf57987d4a60298acce04a9fa9299e9d21a832a335a5
-
SSDEEP
98304:4gwRDvguPP+oGPn58kcuf2ilfio/roYs30f2hi:4govYoGPn5/ui8hi
Static task
static1
Behavioral task
behavioral1
Sample
80bf2731a81c113432f061b397d70cac72d907c39102513abe0f2bae079373e4.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
80bf2731a81c113432f061b397d70cac72d907c39102513abe0f2bae079373e4.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\FreeWorld-Contact.txt
https://github.com/qTox/qTox/releases/download/v1.17.6/setup-qtox-x86_64-release.exe
Extracted
C:\Users\Admin\AppData\Local\FreeWorld-Contact.txt
https://github.com/qTox/qTox/releases/download/v1.17.6/setup-qtox-x86_64-release.exe
Targets
-
-
Target
80bf2731a81c113432f061b397d70cac72d907c39102513abe0f2bae079373e4
-
Size
4.0MB
-
MD5
d59aa49740acb5e45ecb65da070035e3
-
SHA1
4086107b3fb71fb02361306da6099a85be97ae1d
-
SHA256
80bf2731a81c113432f061b397d70cac72d907c39102513abe0f2bae079373e4
-
SHA512
459805b020b78399fae8ac5e8ed439df1b8852519014029833794d2eaad1b1f2aecc3aaba99ae52a0881cf57987d4a60298acce04a9fa9299e9d21a832a335a5
-
SSDEEP
98304:4gwRDvguPP+oGPn58kcuf2ilfio/roYs30f2hi:4govYoGPn5/ui8hi
-
Detects Mimic ransomware
-
Modifies security service
-
Modifies boot configuration data using bcdedit
-
Renames multiple (2659) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Sets file execution options in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
2Indicator Removal
2File Deletion
2Modify Registry
7