Behavioral task
behavioral1
Sample
31331580e3ebff5665cf137870cc0c327f589ea909642151af000b9649f32f0f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
31331580e3ebff5665cf137870cc0c327f589ea909642151af000b9649f32f0f.exe
Resource
win10v2004-20231215-en
General
-
Target
31331580e3ebff5665cf137870cc0c327f589ea909642151af000b9649f32f0f
-
Size
26KB
-
MD5
e299109f71a2a6fcd96e7e1c4334de4e
-
SHA1
dc4af2488b972f254480577cef4490814b419bb0
-
SHA256
31331580e3ebff5665cf137870cc0c327f589ea909642151af000b9649f32f0f
-
SHA512
bcc232be38d500d54d850990523ca02235eb205faf3d6a58b2837d5fa32687928d43d0dea8dd2657bca38aa27513f1780f27d47480724b4c62d4381d4dfb7d23
-
SSDEEP
384:OYenjLLAps4T5lBavzb/xlhKOVp91QZb5hxDGl:9OElB6sc9GZbXxDa
Malware Config
Signatures
-
Chaos Ransomware 1 IoCs
resource yara_rule sample family_chaos -
Chaos family
-
Detects command variations typically used by ransomware 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_GENRansomware -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 31331580e3ebff5665cf137870cc0c327f589ea909642151af000b9649f32f0f
Files
-
31331580e3ebff5665cf137870cc0c327f589ea909642151af000b9649f32f0f.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ