General
-
Target
609a92f4eaf8806467f92ad1f2a2b01638077eea2c977cab1019a14111aa4fce.exe
-
Size
26KB
-
Sample
240128-3eve8scgb2
-
MD5
7b4e20c4a5e449f0b6fb6321b93df08a
-
SHA1
7aae104328c1af9c168379458b9347474e87e287
-
SHA256
1d1f997c4eebb7163ce0cf78aa80008b95b948c56f5f3aab8713a1be781a6e71
-
SHA512
f20f894eea704d7aee25e05ce090c8496508ec4d4144d4a66642941d7358d8f2925645ab21143f3faf00e9ab89b81d283f6d1829f03674ada16ef3804e5d4dd6
-
SSDEEP
384:qYenjLLAps4T5lBavzb/xlhKOVp91Qhb5hxDGz4:5OElB6sc9GhbXxDv
Behavioral task
behavioral1
Sample
609a92f4eaf8806467f92ad1f2a2b01638077eea2c977cab1019a14111aa4fce.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
609a92f4eaf8806467f92ad1f2a2b01638077eea2c977cab1019a14111aa4fce.exe
Resource
win10v2004-20231222-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\read_it.txt
chaos
Targets
-
-
Target
609a92f4eaf8806467f92ad1f2a2b01638077eea2c977cab1019a14111aa4fce.exe
-
Size
26KB
-
MD5
7b4e20c4a5e449f0b6fb6321b93df08a
-
SHA1
7aae104328c1af9c168379458b9347474e87e287
-
SHA256
1d1f997c4eebb7163ce0cf78aa80008b95b948c56f5f3aab8713a1be781a6e71
-
SHA512
f20f894eea704d7aee25e05ce090c8496508ec4d4144d4a66642941d7358d8f2925645ab21143f3faf00e9ab89b81d283f6d1829f03674ada16ef3804e5d4dd6
-
SSDEEP
384:qYenjLLAps4T5lBavzb/xlhKOVp91Qhb5hxDGz4:5OElB6sc9GhbXxDv
Score10/10-
Chaos Ransomware
-
Detects command variations typically used by ransomware
-
Renames multiple (188) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-