General

  • Target

    7dbdb8b4fd0fcf92596a02a244e73a019c65ed0bd6e4cd52203efa2d25c17330

  • Size

    113KB

  • Sample

    240724-t49rsaygmb

  • MD5

    853874e8854e95af8fc673eaad49c840

  • SHA1

    a4e570619d9b7b3c198525035c109e80652f9005

  • SHA256

    7dbdb8b4fd0fcf92596a02a244e73a019c65ed0bd6e4cd52203efa2d25c17330

  • SHA512

    66b305fb0412faeb8c20ff1912b8bdf72cc2d3e731b1c0eec111a3a85a01c3ce3bfc3e1b8c35ab53dcbae0d65d27688c1dbc300fca24e5dbd0397aeaf4bf62da

  • SSDEEP

    3072:OIjShRtl3mQXtgMQ6dmcV2Z9gwR6o7vgWlXOaB/CC5nm:3+3matg76dd2aw7vZfc

Malware Config

Targets

    • Target

      1dacdc296fd6ef6ba817b184cce9901901c47c01d849adfa4222bfabfed61838.exe

    • Size

      232KB

    • MD5

      60fabd1a2509b59831876d5e2aa71a6b

    • SHA1

      8b91f3c4f721cb04cc4974fc91056f397ae78faa

    • SHA256

      1dacdc296fd6ef6ba817b184cce9901901c47c01d849adfa4222bfabfed61838

    • SHA512

      3e842a7d47b32942adb936cae13293eddf1a6b860abcfe7422d0fb73098264cc95656b5c6d9980fad1bf8b5c277cd846c26acaba1bef441582caf34eb1e5295a

    • SSDEEP

      3072:BMhIBKH7j7DzQi7y5bvl4YAbdY9KWvwn7XHMzqEOf64CEEl64HBVdGXPKD:BMh5H7j5g54YZKXoxOuEEl64HZAi

    • Chimera

      Ransomware which infects local and network files, often distributed via Dropbox links.

    • Chimera Ransomware Loader DLL

      Drops/unpacks executable file which resembles Chimera's Loader.dll.

    • Renames multiple (2026) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks