General
-
Target
210b9d652d090c533f8d64e3457c2e3acd42575aa4c86fd02d7e2039704c7c89
-
Size
26KB
-
Sample
240201-ga6rtaedam
-
MD5
a444eacbe9c0ca4d8f35c2a93ff02dc9
-
SHA1
3e72a11a18ed0010098085d9e7befb5b04bdbdf2
-
SHA256
18cd3c1e3e8b02fd1a93a4e6305cc6f91b5a43995afea59ddb9fb6ce016820c9
-
SHA512
018a9544e0fdfc131326c72496116a62de508d78c3391dd3ab33a747fdd9f1c1775d4a442b5eaa5bf60f2c10923ff71c40c9556dda82d3309eedecad6ec81020
-
SSDEEP
384:zYenjLLAps4T5lBavzb/xlhKOVp91Qmb5hxDGWJ:aOElB6sc9GmbXxD3J
Behavioral task
behavioral1
Sample
210b9d652d090c533f8d64e3457c2e3acd42575aa4c86fd02d7e2039704c7c89.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
210b9d652d090c533f8d64e3457c2e3acd42575aa4c86fd02d7e2039704c7c89.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\read_it.txt
chaos
Targets
-
-
Target
210b9d652d090c533f8d64e3457c2e3acd42575aa4c86fd02d7e2039704c7c89
-
Size
26KB
-
MD5
a444eacbe9c0ca4d8f35c2a93ff02dc9
-
SHA1
3e72a11a18ed0010098085d9e7befb5b04bdbdf2
-
SHA256
18cd3c1e3e8b02fd1a93a4e6305cc6f91b5a43995afea59ddb9fb6ce016820c9
-
SHA512
018a9544e0fdfc131326c72496116a62de508d78c3391dd3ab33a747fdd9f1c1775d4a442b5eaa5bf60f2c10923ff71c40c9556dda82d3309eedecad6ec81020
-
SSDEEP
384:zYenjLLAps4T5lBavzb/xlhKOVp91Qmb5hxDGWJ:aOElB6sc9GmbXxD3J
Score10/10-
Chaos Ransomware
-
Detects command variations typically used by ransomware
-
Renames multiple (174) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-