General
-
Target
libvlc.dll
-
Size
186KB
-
Sample
240712-lyhr4sycmr
-
MD5
b8ff818acd53b0016bf83013a8d5f606
-
SHA1
a543a37a74631c0b28898ce6d6cc8db70059669b
-
SHA256
709777343867951673bdc9d75a58c462bae590215e6e124b9c7abccfbbed0b30
-
SHA512
96adae886b5a4d0369140da948e70fb9eea15bab1703d1e54e5ea7b3e8cc7b72bef9995f8d06243968d6b9eb3614fb9ca9e179f2da0542d7d0af5ce523958cb0
-
SSDEEP
3072:pM6pRaubfTPeuD6spsr8VEkycdLQvJLyLMs:pMAHTTGWI0pycqRLyL1
Static task
static1
Behavioral task
behavioral1
Sample
libvlc.dll
Resource
win11-20240709-en
Malware Config
Targets
-
-
Target
libvlc.dll
-
Size
186KB
-
MD5
b8ff818acd53b0016bf83013a8d5f606
-
SHA1
a543a37a74631c0b28898ce6d6cc8db70059669b
-
SHA256
709777343867951673bdc9d75a58c462bae590215e6e124b9c7abccfbbed0b30
-
SHA512
96adae886b5a4d0369140da948e70fb9eea15bab1703d1e54e5ea7b3e8cc7b72bef9995f8d06243968d6b9eb3614fb9ca9e179f2da0542d7d0af5ce523958cb0
-
SSDEEP
3072:pM6pRaubfTPeuD6spsr8VEkycdLQvJLyLMs:pMAHTTGWI0pycqRLyL1
-
Chaos Ransomware
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Drops startup file
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-