General
-
Target
24871ec6c3da2d03deae2bbeab24b0c65f7091164ccb6682429e1f1b056aa4d2
-
Size
26KB
-
Sample
240201-gbfa9aedbm
-
MD5
32b07d7d5a328bb9a1cc0515228bffe6
-
SHA1
f983e8b80d951b7a5ae894be50ef8d3c6a535d33
-
SHA256
136dfa3692389018c3f7d013b0babaaa47f0a6f903e658b73e331edd4637bf93
-
SHA512
fef4f7789a49d1a3a8b53bd25a2818a91438bc0f17443540f882eadded516f338b3f558dbfb282f21a5edd4738409f350a1a5a3cf5af2bdbee2d6b4c7ba4251d
-
SSDEEP
384:zYenjLLAps4T5lBavzb/xlhKOVp91QCb5hxDGa:aOElB6sc9GCbXxDV
Behavioral task
behavioral1
Sample
24871ec6c3da2d03deae2bbeab24b0c65f7091164ccb6682429e1f1b056aa4d2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
24871ec6c3da2d03deae2bbeab24b0c65f7091164ccb6682429e1f1b056aa4d2.exe
Resource
win10v2004-20231222-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\read_it.txt
chaos
Targets
-
-
Target
24871ec6c3da2d03deae2bbeab24b0c65f7091164ccb6682429e1f1b056aa4d2
-
Size
26KB
-
MD5
32b07d7d5a328bb9a1cc0515228bffe6
-
SHA1
f983e8b80d951b7a5ae894be50ef8d3c6a535d33
-
SHA256
136dfa3692389018c3f7d013b0babaaa47f0a6f903e658b73e331edd4637bf93
-
SHA512
fef4f7789a49d1a3a8b53bd25a2818a91438bc0f17443540f882eadded516f338b3f558dbfb282f21a5edd4738409f350a1a5a3cf5af2bdbee2d6b4c7ba4251d
-
SSDEEP
384:zYenjLLAps4T5lBavzb/xlhKOVp91QCb5hxDGa:aOElB6sc9GCbXxDV
Score10/10-
Chaos Ransomware
-
Detects command variations typically used by ransomware
-
Renames multiple (166) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-