General

  • Target

    Encrypter_protected.exe

  • Size

    5.0MB

  • Sample

    240702-j82a4atfpd

  • MD5

    0ab2a8b3f487b14f24db2d611eaa1627

  • SHA1

    927990d479f9c6bb3df78442004feccad4577920

  • SHA256

    11b11b72193938040f5ae32ebd1eb238c9fcd6ba30f8127bd0a0ca5b2cecc5f0

  • SHA512

    bedcf4c0bee5a90a72ba1d17fa9358ae8001cead67280e6edc2b82df440b177f6a97ac3c7aade237e9753ee9eec966aebe4fece1b4c0fcc2e062c5055781357a

  • SSDEEP

    98304:elSSzfc2xJTS4VdJY+ZavQU+PiX1/La2TTyH:elSS42xJTzVHYAan1/maTyH

Malware Config

Extracted

Path

C:\Users\Admin\Desktop\read_it.txt

Ransom Note
----> You got ransom by FemboyCat <---- All of your files have been encrypted Your computer was infected with a ransomware virus. Your files have been encrypted and you won't be able to decrypt them without our help.What can I do to get my files back?You can buy our special decryption software, this software will allow you to recover all of your data and remove the ransomware from your computer.The price for the software is $1,500. Payment can be made in Bitcoin only. How do I pay, where do I get Bitcoin? Purchasing Bitcoin varies from country to country, you are best advised to do a quick google search yourself to find out how to buy Bitcoin. Many of our customers have reported these sites to be fast and reliable: Coinmama - hxxps://www.coinmama.com Bitpanda - hxxps://www.bitpanda.com Payment informationAmount: 0.1473766 BTC Bitcoin Address: bc1qlnzcep4l4ac0ttdrq7awxev9ehu465f2vpt9x0

Targets

    • Target

      Encrypter_protected.exe

    • Size

      5.0MB

    • MD5

      0ab2a8b3f487b14f24db2d611eaa1627

    • SHA1

      927990d479f9c6bb3df78442004feccad4577920

    • SHA256

      11b11b72193938040f5ae32ebd1eb238c9fcd6ba30f8127bd0a0ca5b2cecc5f0

    • SHA512

      bedcf4c0bee5a90a72ba1d17fa9358ae8001cead67280e6edc2b82df440b177f6a97ac3c7aade237e9753ee9eec966aebe4fece1b4c0fcc2e062c5055781357a

    • SSDEEP

      98304:elSSzfc2xJTS4VdJY+ZavQU+PiX1/La2TTyH:elSS42xJTzVHYAan1/maTyH

    • Chaos

      Ransomware family first seen in June 2021.

    • Chaos Ransomware

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks