General

  • Target

    ez.exe

  • Size

    22KB

  • Sample

    240209-jkrrrahc81

  • MD5

    be5080ce91fab9052f760b90af01c266

  • SHA1

    f6e779d724fd203539ce45a701e284dff1069d2b

  • SHA256

    2a4e84c9e612bc1f51e88e2477eaa49dbd38db87dafb1a0cd38732d465048b4a

  • SHA512

    21cca13f426cf6fb60f6e22c38254454cc9fd842ea96a10fde4a99196f7de9e2cf37655623cb9676ff1f24e2deffb6d6543778660ab74a386c9a53d01b740c76

  • SSDEEP

    384:u3Mg/bqo2m9zYMSpgZobHJ2r91ClAgKeT:Mqo2jp5p2r94A3eT

Malware Config

Extracted

Path

C:\Users\Admin\Documents\read_it.txt

Family

chaos

Ransom Note
----> Chaos is multi language ransomware. Translate your note to any language <---- All of your files have been encrypted Your computer was infected with a ransomware virus. Your files have been encrypted and you won't be able to decrypt them without our help.What can I do to get my files back?You can buy our special decryption software, this software will allow you to recover all of your data and remove the ransomware from your computer.The price for the software is $1,500. Payment can be made in robux only! Discord: 0verheaven

Targets

    • Target

      ez.exe

    • Size

      22KB

    • MD5

      be5080ce91fab9052f760b90af01c266

    • SHA1

      f6e779d724fd203539ce45a701e284dff1069d2b

    • SHA256

      2a4e84c9e612bc1f51e88e2477eaa49dbd38db87dafb1a0cd38732d465048b4a

    • SHA512

      21cca13f426cf6fb60f6e22c38254454cc9fd842ea96a10fde4a99196f7de9e2cf37655623cb9676ff1f24e2deffb6d6543778660ab74a386c9a53d01b740c76

    • SSDEEP

      384:u3Mg/bqo2m9zYMSpgZobHJ2r91ClAgKeT:Mqo2jp5p2r94A3eT

    • Chaos

      Ransomware family first seen in June 2021.

    • Chaos Ransomware

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies boot configuration data using bcdedit

    • Deletes backup catalog

      Uses wbadmin.exe to inhibit system recovery.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks