General
-
Target
63fde64543a837c1cf7072bb0478445232d526597a252e335381081f75745bee
-
Size
23KB
-
Sample
240811-1q99qavama
-
MD5
003890676b63239d5fef463e4dd46ed4
-
SHA1
5a9e67ac8794d9bcf18c1e67da5c0bdf1c0adfba
-
SHA256
63fde64543a837c1cf7072bb0478445232d526597a252e335381081f75745bee
-
SHA512
e77d77e8619e700c106b658be724406167043a2989e8da250983dbb4a68481fc76c7b3d5fd433d68cdd1012840e0d6b7ace501facf73d782e392c447b6cc3f6d
-
SSDEEP
384:33Mg/bqo2mJk5BFnqXipFqjuwzU3Jmr91CdFHbTKe3:hqo2b5iXip0jK5mr9YFHbGe3
Behavioral task
behavioral1
Sample
63fde64543a837c1cf7072bb0478445232d526597a252e335381081f75745bee.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
63fde64543a837c1cf7072bb0478445232d526597a252e335381081f75745bee.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Users\Admin\Documents\read_it.txt
Targets
-
-
Target
63fde64543a837c1cf7072bb0478445232d526597a252e335381081f75745bee
-
Size
23KB
-
MD5
003890676b63239d5fef463e4dd46ed4
-
SHA1
5a9e67ac8794d9bcf18c1e67da5c0bdf1c0adfba
-
SHA256
63fde64543a837c1cf7072bb0478445232d526597a252e335381081f75745bee
-
SHA512
e77d77e8619e700c106b658be724406167043a2989e8da250983dbb4a68481fc76c7b3d5fd433d68cdd1012840e0d6b7ace501facf73d782e392c447b6cc3f6d
-
SSDEEP
384:33Mg/bqo2mJk5BFnqXipFqjuwzU3Jmr91CdFHbTKe3:hqo2b5iXip0jK5mr9YFHbGe3
-
Chaos Ransomware
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-