Behavioral task
behavioral1
Sample
4debc387966fb671fda6a3681133273a34ffa71215961cd18f73ac0575f859c8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4debc387966fb671fda6a3681133273a34ffa71215961cd18f73ac0575f859c8.exe
Resource
win10v2004-20231222-en
General
-
Target
4debc387966fb671fda6a3681133273a34ffa71215961cd18f73ac0575f859c8.exe
-
Size
26KB
-
MD5
a398de6cd01f5b5f85725c48a74865b6
-
SHA1
452ddf5cde6bbf4d17d302b7e3eb99c0f4cc79a3
-
SHA256
dd0c6271afc6a73acbbd7219c38242edf584b13c4c40904395e596575f859476
-
SHA512
d62f241084c5ab67931b544a61b9baa098a38442a94bcd79cff2de6c58f24cc48564530dea11d6b4da5f81abac8c240e5ea14ccbe4b02e0817aac3c6578f3702
-
SSDEEP
384:qYenjLLAps4T5lBavzb/xlhKOVp91QMb5hxDGy:5OElB6sc9GMbXxDt
Malware Config
Signatures
-
Chaos Ransomware 1 IoCs
resource yara_rule sample family_chaos -
Chaos family
-
Detects command variations typically used by ransomware 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_GENRansomware -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4debc387966fb671fda6a3681133273a34ffa71215961cd18f73ac0575f859c8.exe
Files
-
4debc387966fb671fda6a3681133273a34ffa71215961cd18f73ac0575f859c8.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ