General
-
Target
The-MALWARE-Repo
-
Size
296KB
-
Sample
240802-x9f87ssbne
-
MD5
3b4c9813b9b4d3cdd4323d05ec9f43f7
-
SHA1
c969b185309f49b508110bb1782f597dff1ecbf9
-
SHA256
9165ba41f87182c5d0b35d44da7f57bae304dd7e148dbd3b8803bf772b69ed02
-
SHA512
777c8f18984bb5698ddaf5413b9a7c22a1b67b14178ec3c56a652e849218f7084c4e18858c868dfa1669ab3e1b2a54e11690b50d6fc0a94f00f78850abb97261
-
SSDEEP
6144:adfo4Q3uokeOvHS1d1+sNs8wbiWQQ9DvZJT3CqbMrhryf65NRPaCieMjAkvCJv1Y:ao4Q3uokeOvHS1d1+sNs8wbiWQQ9DvZT
Static task
static1
Behavioral task
behavioral1
Sample
The-MALWARE-Repo
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
The-MALWARE-Repo
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
The-MALWARE-Repo
-
Size
296KB
-
MD5
3b4c9813b9b4d3cdd4323d05ec9f43f7
-
SHA1
c969b185309f49b508110bb1782f597dff1ecbf9
-
SHA256
9165ba41f87182c5d0b35d44da7f57bae304dd7e148dbd3b8803bf772b69ed02
-
SHA512
777c8f18984bb5698ddaf5413b9a7c22a1b67b14178ec3c56a652e849218f7084c4e18858c868dfa1669ab3e1b2a54e11690b50d6fc0a94f00f78850abb97261
-
SSDEEP
6144:adfo4Q3uokeOvHS1d1+sNs8wbiWQQ9DvZJT3CqbMrhryf65NRPaCieMjAkvCJv1Y:ao4Q3uokeOvHS1d1+sNs8wbiWQQ9DvZT
Score10/10-
Chimera
Ransomware which infects local and network files, often distributed via Dropbox links.
-
Chimera Ransomware Loader DLL
Drops/unpacks executable file which resembles Chimera's Loader.dll.
-
Renames multiple (3273) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-