Resubmissions

30-03-2024 18:24

240330-w15prsbf31 10

General

  • Target

    virus.mp4

  • Size

    926KB

  • Sample

    240330-w15prsbf31

  • MD5

    55eaf87a0bbf92bcc275099fc840228a

  • SHA1

    3d47d42f1b75ec610139d959bf40d79a85dc31b7

  • SHA256

    e7de3a6f534de01b388d8258c1157d8771bbae17eb2a0320b995685d72e16f23

  • SHA512

    9505fc66f2bc89163dae4e2b1163b62fc357d3382215cd00e830686005f4cca5eeedb45a4f8d1342272f5f98237e7d65a13b8d04b691dda60c1bfdfb35c276bb

  • SSDEEP

    24576:Gf4u1oa524tXgiCb9ZqoPjVd/OMW78bcj:844HFe9ZqkjnWobw

Malware Config

Targets

    • Target

      virus.mp4

    • Size

      926KB

    • MD5

      55eaf87a0bbf92bcc275099fc840228a

    • SHA1

      3d47d42f1b75ec610139d959bf40d79a85dc31b7

    • SHA256

      e7de3a6f534de01b388d8258c1157d8771bbae17eb2a0320b995685d72e16f23

    • SHA512

      9505fc66f2bc89163dae4e2b1163b62fc357d3382215cd00e830686005f4cca5eeedb45a4f8d1342272f5f98237e7d65a13b8d04b691dda60c1bfdfb35c276bb

    • SSDEEP

      24576:Gf4u1oa524tXgiCb9ZqoPjVd/OMW78bcj:844HFe9ZqkjnWobw

    • Chaos

      Ransomware family first seen in June 2021.

    • Chaos Ransomware

    • Creates new service(s)

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Stops running service(s)

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Registers COM server for autorun

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks