General
-
Target
PrivateChat V2.0.exe
-
Size
87KB
-
Sample
240322-2t5zvaaa67
-
MD5
4e0daa19b125c8e2703e9de440b1340b
-
SHA1
8dd7592a40384093ab296ea4a0ae14102441b884
-
SHA256
2dcc9c629488710a424dba2eefcfbecbf1edcc092a8387be7929db59f9692e71
-
SHA512
8bf90f3d89e0592b5e5f1f6b1d5a362b1db84612eb8f737bec7e17c25e8e9748dd0293e40addea8f77c4f49e7e3a1e345ff78e1ee150dc29bfb643bbdb78e040
-
SSDEEP
1536:SPvg251EzYY2MkcqhQP6xY9G+beYZFy+U0/A1OG36zvO5d2LueRISbfX:SPvg2szr5kcqhgx8+be+yTL+OjOusr
Behavioral task
behavioral1
Sample
PrivateChat V2.0.exe
Resource
win7-20240221-en
Malware Config
Extracted
xworm
employees-resolution.gl.at.ply.gg:35582
-
install_file
USB.exe
Targets
-
-
Target
PrivateChat V2.0.exe
-
Size
87KB
-
MD5
4e0daa19b125c8e2703e9de440b1340b
-
SHA1
8dd7592a40384093ab296ea4a0ae14102441b884
-
SHA256
2dcc9c629488710a424dba2eefcfbecbf1edcc092a8387be7929db59f9692e71
-
SHA512
8bf90f3d89e0592b5e5f1f6b1d5a362b1db84612eb8f737bec7e17c25e8e9748dd0293e40addea8f77c4f49e7e3a1e345ff78e1ee150dc29bfb643bbdb78e040
-
SSDEEP
1536:SPvg251EzYY2MkcqhQP6xY9G+beYZFy+U0/A1OG36zvO5d2LueRISbfX:SPvg2szr5kcqhgx8+be+yTL+OjOusr
-
Chaos Ransomware
-
Detect Xworm Payload
-
Modifies boot configuration data using bcdedit
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Sets desktop wallpaper using registry
-