General
-
Target
1e2ae8d499878e28e27a0d4ab6f51db8103128404dae7bdcff3064becf453ef0
-
Size
26KB
-
Sample
240201-hwh4bafhdq
-
MD5
b4690dae667b4d3eeee88b13f6d102bc
-
SHA1
16b9332f432d9b9810aef6b01f49ac44d84d0855
-
SHA256
1e2ae8d499878e28e27a0d4ab6f51db8103128404dae7bdcff3064becf453ef0
-
SHA512
a7411abfb45a2a0a2989d0058c596f7fc379e301ee8bfe4ba36180c26cbb8e3460812347f0ba22b652d7edaeab681e0976e3d1443dd7cb04546667a084566ec2
-
SSDEEP
384:OYenjLLAps4T5lBavzb/xlhKOVp91Qwb5hxDGy:9OElB6sc9GwbXxDd
Behavioral task
behavioral1
Sample
1e2ae8d499878e28e27a0d4ab6f51db8103128404dae7bdcff3064becf453ef0.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1e2ae8d499878e28e27a0d4ab6f51db8103128404dae7bdcff3064becf453ef0.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\read_it.txt
chaos
Targets
-
-
Target
1e2ae8d499878e28e27a0d4ab6f51db8103128404dae7bdcff3064becf453ef0
-
Size
26KB
-
MD5
b4690dae667b4d3eeee88b13f6d102bc
-
SHA1
16b9332f432d9b9810aef6b01f49ac44d84d0855
-
SHA256
1e2ae8d499878e28e27a0d4ab6f51db8103128404dae7bdcff3064becf453ef0
-
SHA512
a7411abfb45a2a0a2989d0058c596f7fc379e301ee8bfe4ba36180c26cbb8e3460812347f0ba22b652d7edaeab681e0976e3d1443dd7cb04546667a084566ec2
-
SSDEEP
384:OYenjLLAps4T5lBavzb/xlhKOVp91Qwb5hxDGy:9OElB6sc9GwbXxDd
Score10/10-
Chaos Ransomware
-
Detects command variations typically used by ransomware
-
Renames multiple (150) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-