General
-
Target
XClient.exe
-
Size
1.3MB
-
Sample
240501-ndh89afg46
-
MD5
0e7dbde65ff6eb526caf5a8517b3ef14
-
SHA1
326b1a54238ff6560dea85053bbea1c521dddd62
-
SHA256
3a23809b4f8c295cc07fb589966ef0c695d6df61c244e28127be54874ef38ec4
-
SHA512
f6fd535c17c5ea57eb9ee6a0f6705885b58b628801b3cd6e792da1518d5e1e490a007dbb9f1e72341ba2e60c635c2549762faed878fcdfac7633f3074dc55302
-
SSDEEP
6144:HCvSkBoOd7x9JR0hg5efTfnxPQ6EgjDcOKeSZhzjnnpDnC5QQfWMFH6n/8sJdaTp:HCvTo+GTfnxPQlgyymKJ162d0jLifU
Static task
static1
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
XClient.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
C:\Users\Admin\Pictures\read_it.txt
Targets
-
-
Target
XClient.exe
-
Size
1.3MB
-
MD5
0e7dbde65ff6eb526caf5a8517b3ef14
-
SHA1
326b1a54238ff6560dea85053bbea1c521dddd62
-
SHA256
3a23809b4f8c295cc07fb589966ef0c695d6df61c244e28127be54874ef38ec4
-
SHA512
f6fd535c17c5ea57eb9ee6a0f6705885b58b628801b3cd6e792da1518d5e1e490a007dbb9f1e72341ba2e60c635c2549762faed878fcdfac7633f3074dc55302
-
SSDEEP
6144:HCvSkBoOd7x9JR0hg5efTfnxPQ6EgjDcOKeSZhzjnnpDnC5QQfWMFH6n/8sJdaTp:HCvTo+GTfnxPQlgyymKJ162d0jLifU
Score10/10-
Chaos Ransomware
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-