General
-
Target
955438b11b8e09bd6ea34782da0628a6c9a8b4c88a79288d3a7187da9a6fedee
-
Size
26KB
-
Sample
240201-gdsz5acdh6
-
MD5
4583ac89efa48aa443fd3328a8820c77
-
SHA1
1f11e40517cdef2081c47f8db2acdcc52f3be3c6
-
SHA256
9ada90ff5ea311fc6a10d4eb8777ed7c8f081a27f2fb74f962f0abfdab61075c
-
SHA512
ee85d39bcac78b127bf827d31628daf052b5c4b3d9b0da85b77f486b6244d236747797f7ed4389a498dc0e172334b7cde121c8f246e33d932af2d783cb1cd36b
-
SSDEEP
384:CYenjLLAps4T5lBavzb/xlhKOVp91Qyb5hxDGZ:hOElB6sc9GybXxDO
Behavioral task
behavioral1
Sample
955438b11b8e09bd6ea34782da0628a6c9a8b4c88a79288d3a7187da9a6fedee.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
955438b11b8e09bd6ea34782da0628a6c9a8b4c88a79288d3a7187da9a6fedee.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\read_it.txt
chaos
Targets
-
-
Target
955438b11b8e09bd6ea34782da0628a6c9a8b4c88a79288d3a7187da9a6fedee
-
Size
26KB
-
MD5
4583ac89efa48aa443fd3328a8820c77
-
SHA1
1f11e40517cdef2081c47f8db2acdcc52f3be3c6
-
SHA256
9ada90ff5ea311fc6a10d4eb8777ed7c8f081a27f2fb74f962f0abfdab61075c
-
SHA512
ee85d39bcac78b127bf827d31628daf052b5c4b3d9b0da85b77f486b6244d236747797f7ed4389a498dc0e172334b7cde121c8f246e33d932af2d783cb1cd36b
-
SSDEEP
384:CYenjLLAps4T5lBavzb/xlhKOVp91Qyb5hxDGZ:hOElB6sc9GybXxDO
Score10/10-
Chaos Ransomware
-
Detects command variations typically used by ransomware
-
Renames multiple (181) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-