General
-
Target
17560242131.zip
-
Size
320KB
-
Sample
240605-jpzcdsaa91
-
MD5
1a9e5d18ad3df046eaa8d431a48a2b2a
-
SHA1
6f99aa0906fe34a3f2033423ca8e053002d2843a
-
SHA256
d4d5f54dd003162bf3d04f0343ea136226552b2e004c2ba565d38803cb9f5282
-
SHA512
e0fcf57b62202c7f3c4dbacdb31ff04ea547d562b68f2bec8a4a0d4ef10c71216a1794d7d6f7624cdeeb7b86c48e7e074522c9078b1c70fe8f5857f7e9e3ef0c
-
SSDEEP
6144:mKme+a2LchRZMjReP2ICVbzD7mFtQCEKh3/6S3lKZIsOCp+99q3HW6SzJQdrRHAd:mKl+XLYueP3kbCtxva+am6kJ02M6
Static task
static1
Behavioral task
behavioral1
Sample
176aa2e0fe77812b96ff393d634175093672ca764f41c146f04ca3deb8be4fbe.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
176aa2e0fe77812b96ff393d634175093672ca764f41c146f04ca3deb8be4fbe.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
C:\$Recycle.Bin\FILE RECOVERY.txt
targetcompany
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion/mallox/privateSignin
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion
Extracted
\Device\HarddiskVolume1\FILE RECOVERY.txt
targetcompany
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion/mallox/privateSignin
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion
Targets
-
-
Target
176aa2e0fe77812b96ff393d634175093672ca764f41c146f04ca3deb8be4fbe
-
Size
407KB
-
MD5
2a87e5d9f20df46363ce6e9b7559827a
-
SHA1
264a45ea0464a6efb7407776cfcfd1baebe27e7c
-
SHA256
176aa2e0fe77812b96ff393d634175093672ca764f41c146f04ca3deb8be4fbe
-
SHA512
a3bc9c4a6e2659c02951b59e6477d180a8ff590631b2eacc005fee49d1a4a615e23cf08095e2572c3a9785c5a27a43b792b0713b9aaa1187edb535803b7d633a
-
SSDEEP
6144:IZMslTeyLdj/YTqX3cM74I34Ae3hQTNa8Y0cYTwp72fjDnWMwt:ICweydWqnT4IoB2a8Y/+6ft
-
TargetCompany,Mallox
TargetCompany (aka Mallox) is a ransomware which encrypts files using a combination of ChaCha20, AES-128, and Curve25519, first seen in June 2021.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (2575) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Modifies file permissions
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
System Services
1Service Execution
1Windows Management Instrumentation
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
1Indicator Removal
2File Deletion
2