General
-
Target
42f1eec20759f9b42984c4fe775e30efc747ae0b2329b0e37fbb2eaf2ff115f5
-
Size
378KB
-
Sample
240320-mzgrwafa36
-
MD5
7ff03c09f592f437c493eff42dc143c9
-
SHA1
6016c2e09379df9b80830b89f28dc712f98975ba
-
SHA256
42f1eec20759f9b42984c4fe775e30efc747ae0b2329b0e37fbb2eaf2ff115f5
-
SHA512
a9bb30a2faf4a6170ff168a73692849f3ca254b5c07ea1e8e2afdbfee281361c1e527b8a79f89f5ce50931b86cfc3b70f6c819b4eae8cddee1cc4660c9d66fc5
-
SSDEEP
6144:J04wA+vmfYCwresvFTPQq4qBLZXL9JsdP4XLhrw:uA6mfYCstTPQq4qlxRJiP47
Static task
static1
Behavioral task
behavioral1
Sample
42f1eec20759f9b42984c4fe775e30efc747ae0b2329b0e37fbb2eaf2ff115f5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
42f1eec20759f9b42984c4fe775e30efc747ae0b2329b0e37fbb2eaf2ff115f5.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
F:\$RECYCLE.BIN\S-1-5-21-406356229-2805545415-1236085040-1000\HOW TO BACK FILES.txt
targetcompany
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion/mallox/privateSignin
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion
Extracted
C:\Users\Admin\Contacts\HOW TO BACK FILES.txt
targetcompany
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion/mallox/privateSignin
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion
Targets
-
-
Target
42f1eec20759f9b42984c4fe775e30efc747ae0b2329b0e37fbb2eaf2ff115f5
-
Size
378KB
-
MD5
7ff03c09f592f437c493eff42dc143c9
-
SHA1
6016c2e09379df9b80830b89f28dc712f98975ba
-
SHA256
42f1eec20759f9b42984c4fe775e30efc747ae0b2329b0e37fbb2eaf2ff115f5
-
SHA512
a9bb30a2faf4a6170ff168a73692849f3ca254b5c07ea1e8e2afdbfee281361c1e527b8a79f89f5ce50931b86cfc3b70f6c819b4eae8cddee1cc4660c9d66fc5
-
SSDEEP
6144:J04wA+vmfYCwresvFTPQq4qBLZXL9JsdP4XLhrw:uA6mfYCstTPQq4qlxRJiP47
Score10/10-
TargetCompany,Mallox
TargetCompany (aka Mallox) is a ransomware which encrypts files using a combination of ChaCha20, AES-128, and Curve25519, first seen in June 2021.
-
Modifies boot configuration data using bcdedit
-
Renames multiple (4498) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-