General
-
Target
2024-02-01_6ff0562de33dde7498bdcd0bec418d14_chaos_destroyer_wannacry
-
Size
26KB
-
Sample
240201-tpn7jabefj
-
MD5
6ff0562de33dde7498bdcd0bec418d14
-
SHA1
cc50f1aec12b4b53c4f6c0df255db6b5e26d51a6
-
SHA256
005549db04af2245f3416966aa7808902cc387c51831c7d3c339c753bc1df63e
-
SHA512
064d0d30cc63a8dfd6c1536e6ea3a93108c74c2aa62e6c89d2fe3eb0480baedc843f881e8dcbd67a45fc02b21c5b6c6f4e7f207ee0eca318cdfd1ced02ce9abc
-
SSDEEP
384:5YenjLLAps4T5lBavzb/xlhKOVp91QBb5hxDG1:4OElB6sc9GBbXxD6
Behavioral task
behavioral1
Sample
2024-02-01_6ff0562de33dde7498bdcd0bec418d14_chaos_destroyer_wannacry.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-01_6ff0562de33dde7498bdcd0bec418d14_chaos_destroyer_wannacry.exe
Resource
win10-20231215-en
Behavioral task
behavioral3
Sample
2024-02-01_6ff0562de33dde7498bdcd0bec418d14_chaos_destroyer_wannacry.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral4
Sample
2024-02-01_6ff0562de33dde7498bdcd0bec418d14_chaos_destroyer_wannacry.exe
Resource
win11-20231215-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\read_it.txt
chaos
Targets
-
-
Target
2024-02-01_6ff0562de33dde7498bdcd0bec418d14_chaos_destroyer_wannacry
-
Size
26KB
-
MD5
6ff0562de33dde7498bdcd0bec418d14
-
SHA1
cc50f1aec12b4b53c4f6c0df255db6b5e26d51a6
-
SHA256
005549db04af2245f3416966aa7808902cc387c51831c7d3c339c753bc1df63e
-
SHA512
064d0d30cc63a8dfd6c1536e6ea3a93108c74c2aa62e6c89d2fe3eb0480baedc843f881e8dcbd67a45fc02b21c5b6c6f4e7f207ee0eca318cdfd1ced02ce9abc
-
SSDEEP
384:5YenjLLAps4T5lBavzb/xlhKOVp91QBb5hxDG1:4OElB6sc9GBbXxD6
Score10/10-
Chaos Ransomware
-
Renames multiple (161) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-