General
-
Target
jjj.bin
-
Size
23KB
-
Sample
240414-dwlf8agh2t
-
MD5
042af9c511552255aed26954d500543c
-
SHA1
e478b331aec1166f16a714e2a4320fcb04d54b16
-
SHA256
b69bb28aa423914139a3edcf9fdb617f3105d971e628c4cd82bbd62b9fc32b85
-
SHA512
5729179cce14e135b9e9d79d1acf4e518f2eadff604e5094e9f1eaf9e8c2ef9a3ada18905c55143fe2bbeaf020f3cff3b7e7e9b0845475353fff286a0cefa664
-
SSDEEP
384:R3Mg/bqo2i5rMfpz0qjuwzUrJXmr91C221gYei:Tqo2Ir8pzRjKd2r9t2xei
Behavioral task
behavioral1
Sample
jjj.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
jjj.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
C:\Users\Admin\Documents\READ_IT.txt
https://ibb.co/RHs43WH
Targets
-
-
Target
jjj.bin
-
Size
23KB
-
MD5
042af9c511552255aed26954d500543c
-
SHA1
e478b331aec1166f16a714e2a4320fcb04d54b16
-
SHA256
b69bb28aa423914139a3edcf9fdb617f3105d971e628c4cd82bbd62b9fc32b85
-
SHA512
5729179cce14e135b9e9d79d1acf4e518f2eadff604e5094e9f1eaf9e8c2ef9a3ada18905c55143fe2bbeaf020f3cff3b7e7e9b0845475353fff286a0cefa664
-
SSDEEP
384:R3Mg/bqo2i5rMfpz0qjuwzUrJXmr91C221gYei:Tqo2Ir8pzRjKd2r9t2xei
Score10/10-
Chaos Ransomware
-
Detects command variations typically used by ransomware
-
Modifies boot configuration data using bcdedit
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-