General

  • Target

    rizzler.exe

  • Size

    348KB

  • Sample

    240730-xgp1msxepb

  • MD5

    fc031cdd7fe84e5221305c87e6375e13

  • SHA1

    57f0e3cd6bf5dc09fbaacd0d9fcb7bf35af8eed7

  • SHA256

    1e93d49cb048b0bf26ddd4cf728fc9e7900b33222de596140cac44dc41bc14f4

  • SHA512

    67f4094e826d990e26de3e0770ad7eb87046dc6fefdc1278ebe0995b5e33282dc05b025f9b49aafedcaca491f563f48963be559456c1fe1b6e401250e8659546

  • SSDEEP

    6144:Ic9HqFqv+GIIIIIIIhIIIIIIIIIIIIIIIU:7qkQ

Malware Config

Targets

    • Target

      rizzler.exe

    • Size

      348KB

    • MD5

      fc031cdd7fe84e5221305c87e6375e13

    • SHA1

      57f0e3cd6bf5dc09fbaacd0d9fcb7bf35af8eed7

    • SHA256

      1e93d49cb048b0bf26ddd4cf728fc9e7900b33222de596140cac44dc41bc14f4

    • SHA512

      67f4094e826d990e26de3e0770ad7eb87046dc6fefdc1278ebe0995b5e33282dc05b025f9b49aafedcaca491f563f48963be559456c1fe1b6e401250e8659546

    • SSDEEP

      6144:Ic9HqFqv+GIIIIIIIhIIIIIIIIIIIIIIIU:7qkQ

    • Chaos

      Ransomware family first seen in June 2021.

    • Chaos Ransomware

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies boot configuration data using bcdedit

    • Renames multiple (199) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Deletes backup catalog

      Uses wbadmin.exe to inhibit system recovery.

    • Disables Task Manager via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks