General
-
Target
4e7a303de4c373f95ad7f81805d4e46fa2d508bd0dc9ea64eb41f97460c6d2aa.exe
-
Size
26KB
-
Sample
240128-24xq8acdd6
-
MD5
4d0ec70c1ea5e1f18d9ec03823f23cd7
-
SHA1
376a6d7e63c3a4558b442172bab4ff6a557f6bc7
-
SHA256
862e16b82706ee994de1d29d077cf9ed7db8920678ccf01fd03bef37213e0c7a
-
SHA512
072ebb54559fedd9991a221d9d26da4450612dc8cc3636aa250e67dfbbad156406dfb722d7cb4d577d64bec697d2fe8c8181f56c3e7c66c6969ac10ed04ce7a2
-
SSDEEP
384:qYenjLLAps4T5lBavzb/xlhKOVp91Qmb5hxDG5N:5OElB6sc9GmbXxDeN
Behavioral task
behavioral1
Sample
4e7a303de4c373f95ad7f81805d4e46fa2d508bd0dc9ea64eb41f97460c6d2aa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4e7a303de4c373f95ad7f81805d4e46fa2d508bd0dc9ea64eb41f97460c6d2aa.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\read_it.txt
chaos
Targets
-
-
Target
4e7a303de4c373f95ad7f81805d4e46fa2d508bd0dc9ea64eb41f97460c6d2aa.exe
-
Size
26KB
-
MD5
4d0ec70c1ea5e1f18d9ec03823f23cd7
-
SHA1
376a6d7e63c3a4558b442172bab4ff6a557f6bc7
-
SHA256
862e16b82706ee994de1d29d077cf9ed7db8920678ccf01fd03bef37213e0c7a
-
SHA512
072ebb54559fedd9991a221d9d26da4450612dc8cc3636aa250e67dfbbad156406dfb722d7cb4d577d64bec697d2fe8c8181f56c3e7c66c6969ac10ed04ce7a2
-
SSDEEP
384:qYenjLLAps4T5lBavzb/xlhKOVp91Qmb5hxDG5N:5OElB6sc9GmbXxDeN
Score10/10-
Chaos Ransomware
-
Detects command variations typically used by ransomware
-
Renames multiple (163) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-