General
-
Target
malware.7z
-
Size
260KB
-
Sample
240805-mq534stenm
-
MD5
653bccb88e8d955100c50f878f04eea9
-
SHA1
1d6caa2d84fa0b51d6ce7d15f98f92c442e3a4cf
-
SHA256
5747e9cd2cabeea85ad02e83ec4124c4461a20065d3a631340c155b2e4c8b121
-
SHA512
bc4dcb5050c0a808fd7f7246d9b57dbbfc8022023b0ff1a15106ec5f7cdaaa28b2a479d39b4c1df35013c6c6dd4db4a7ef3054b75f99e3ad1254fe1906bd9751
-
SSDEEP
6144:XiyJNIv3zg+6Z1mzfxtofl6cKpV3G6Ohgv282mD/+0TubcHlaX:TAKzAf/aKpV38hgRr+6uClY
Static task
static1
Behavioral task
behavioral1
Sample
Project2.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Project2.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\HOW TO BACK FILES.txt
targetcompany
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion/mallox/privateSignin
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion
Extracted
\Device\HarddiskVolume1\HOW TO BACK FILES.txt
targetcompany
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion/mallox/privateSignin
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion
Targets
-
-
Target
Project2.exe
-
Size
12KB
-
MD5
2e098fe6d840861abc61a0b542a0069b
-
SHA1
e4dd6bb202abb8defa8688fd122e979311a80a0b
-
SHA256
29c12e35c1942362bdb1e41cc45e65f51ec5f40a0b84c1406b56addf24d814bc
-
SHA512
46323dbfacb5e67012300b207d8143bdc227f679c37104feefa91e62845457683d63de2de3457359b701e3f919289ef66af1293c8d5c2e9a65312f626f5f3ab2
-
SSDEEP
96:QQJsYdT/L3YhpwbmTt7YJ/zUce6rsPX0zjQqeZ8CjRdGLj7jPrmFxe3Q5tfcsDJu:QYdTzI3OUe3SkjQxe3Q5tfFDA+Z2
-
TargetCompany,Mallox
TargetCompany (aka Mallox) is a ransomware which encrypts files using a combination of ChaCha20, AES-128, and Curve25519, first seen in June 2021.
-
Modifies boot configuration data using bcdedit
-
Renames multiple (7236) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-