General
-
Target
FridayBoycrazyV2.exe
-
Size
280KB
-
Sample
240812-a63ayaxdlk
-
MD5
41e34a8240026b4e9cd8d81a73ee8b2c
-
SHA1
3876b12e152dd552a7059538242b6f87a23e60f5
-
SHA256
0ef2768bdfaa0b953a5c498f18bbf2df5dce249eaf2044474c476c4367c535b5
-
SHA512
a7d610ee4f116121757f47193bf092b639cf2d439dcfa364ea800c28c0f21996fd8baa31c9abe68d2c18cc8f334c57f9d71c4e444a04a27d3b9cab90eecbba73
-
SSDEEP
6144:1r93iyJ7/+WZT1kRnSeXSX9MNzxiMwP2OswK:iyJ7/+Wd1kRnFX4mNzxyeOswK
Behavioral task
behavioral1
Sample
FridayBoycrazyV2.exe
Resource
win11-20240802-en
Malware Config
Extracted
C:\Users\Admin\Documents\Warning.txt
https://www.roblox.com/game-pass/887175972
https://venmo.com/u/gratefulcode
Targets
-
-
Target
FridayBoycrazyV2.exe
-
Size
280KB
-
MD5
41e34a8240026b4e9cd8d81a73ee8b2c
-
SHA1
3876b12e152dd552a7059538242b6f87a23e60f5
-
SHA256
0ef2768bdfaa0b953a5c498f18bbf2df5dce249eaf2044474c476c4367c535b5
-
SHA512
a7d610ee4f116121757f47193bf092b639cf2d439dcfa364ea800c28c0f21996fd8baa31c9abe68d2c18cc8f334c57f9d71c4e444a04a27d3b9cab90eecbba73
-
SSDEEP
6144:1r93iyJ7/+WZT1kRnSeXSX9MNzxiMwP2OswK:iyJ7/+Wd1kRnFX4mNzxyeOswK
-
Chaos Ransomware
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1