General
-
Target
df12edb885d4e832139871c4a4c21179ce29c69bb41543928d633a636f0e8e86
-
Size
4.8MB
-
Sample
240227-mwqklseg74
-
MD5
fccd0e6ed4dcf6d1b922762980fb5f8e
-
SHA1
cf13f9c5cf05e7188d22723fe3901b78b3d5e88c
-
SHA256
df12edb885d4e832139871c4a4c21179ce29c69bb41543928d633a636f0e8e86
-
SHA512
2dd055d973501821d766bafe1c742863f5030f17a0399e0e67c96ece71c4fcb596b3a91b0f39d5da89a98ed14045b7652b3b7233bb54b9f1212183d6762633ad
-
SSDEEP
24576:JKMhfwBxch7B20eyMnCVuwCk7TU5HRYalVn3FPvIDLFU3+xJHIlw66BuSBn4Q71V:fqch7BZM+7TuxY7u6BuSB/1v7h
Static task
static1
Behavioral task
behavioral1
Sample
df12edb885d4e832139871c4a4c21179ce29c69bb41543928d633a636f0e8e86.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
df12edb885d4e832139871c4a4c21179ce29c69bb41543928d633a636f0e8e86.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
C:\Users\Admin\Contacts\HOW TO RESTORE FILES.txt
targetcompany
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion/mallox/privateSignin
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion
Targets
-
-
Target
df12edb885d4e832139871c4a4c21179ce29c69bb41543928d633a636f0e8e86
-
Size
4.8MB
-
MD5
fccd0e6ed4dcf6d1b922762980fb5f8e
-
SHA1
cf13f9c5cf05e7188d22723fe3901b78b3d5e88c
-
SHA256
df12edb885d4e832139871c4a4c21179ce29c69bb41543928d633a636f0e8e86
-
SHA512
2dd055d973501821d766bafe1c742863f5030f17a0399e0e67c96ece71c4fcb596b3a91b0f39d5da89a98ed14045b7652b3b7233bb54b9f1212183d6762633ad
-
SSDEEP
24576:JKMhfwBxch7B20eyMnCVuwCk7TU5HRYalVn3FPvIDLFU3+xJHIlw66BuSBn4Q71V:fqch7BZM+7TuxY7u6BuSB/1v7h
Score10/10-
Detect ZGRat V1
-
TargetCompany,Mallox
TargetCompany (aka Mallox) is a ransomware which encrypts files using a combination of ChaCha20, AES-128, and Curve25519, first seen in June 2021.
-
Detects command variations typically used by ransomware
-
Renames multiple (3477) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-