General
-
Target
d332b145aec1260fd7a4877377e0778c5cf4ea66ec98dd5e1fb711836fc6b38d
-
Size
26KB
-
Sample
240201-ge8f7seeek
-
MD5
47f7a07d58a42e6288edba0719f7accf
-
SHA1
885ae293ee9942dcd255f145c0f6581351fb1fa7
-
SHA256
0e3a88d2fcb105bf479c54b92b570a8d429f00e94fc8e5652e5a766b7ee065a7
-
SHA512
53bc4c95f48cc0acbff3c3a78fb467bc2e5aadd4c9540fc8c47b2151cde94d2997423c463d901b2ab8e0cab9004508541ffe7c50333284517680337e21b338a9
-
SSDEEP
384:CYenjLLAps4T5lBavzb/xlhKOVp91Q+b5hxDGq:hOElB6sc9G+bXxDF
Behavioral task
behavioral1
Sample
d332b145aec1260fd7a4877377e0778c5cf4ea66ec98dd5e1fb711836fc6b38d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
d332b145aec1260fd7a4877377e0778c5cf4ea66ec98dd5e1fb711836fc6b38d.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\read_it.txt
chaos
Targets
-
-
Target
d332b145aec1260fd7a4877377e0778c5cf4ea66ec98dd5e1fb711836fc6b38d
-
Size
26KB
-
MD5
47f7a07d58a42e6288edba0719f7accf
-
SHA1
885ae293ee9942dcd255f145c0f6581351fb1fa7
-
SHA256
0e3a88d2fcb105bf479c54b92b570a8d429f00e94fc8e5652e5a766b7ee065a7
-
SHA512
53bc4c95f48cc0acbff3c3a78fb467bc2e5aadd4c9540fc8c47b2151cde94d2997423c463d901b2ab8e0cab9004508541ffe7c50333284517680337e21b338a9
-
SSDEEP
384:CYenjLLAps4T5lBavzb/xlhKOVp91Q+b5hxDGq:hOElB6sc9G+bXxDF
Score10/10-
Chaos Ransomware
-
Detects command variations typically used by ransomware
-
Renames multiple (176) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-