General
-
Target
temp.exe
-
Size
147KB
-
Sample
240829-kbs4wstgkj
-
MD5
b32a8951fc4c2e4c2d63d17200ca0032
-
SHA1
655b5a05bbf27b16f1c8fbad2924a76df968dda8
-
SHA256
7d67c8711b4cad0f585604ff3f9f8f40359e4f8e1524e152f50159b0f56d0952
-
SHA512
0df9c6ddd90393cc8e669ddc50cdd285e4c693a51141bd352985d78f48afca5017120ea50c57a56f45f13a90e2dccf64110a2fc23a5fe14ac59b6892a316dd92
-
SSDEEP
3072:K6glyuxE4GsUPnliByocWepW77ys/nX4OEB:K6gDBGpvEByocWeG77/nX4NB
Behavioral task
behavioral1
Sample
temp.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
temp.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\aGcKejnaU.README.txt
braincipher
http://vkvsgl7lhipjirmz6j5ubp3w3bwvxgcdbpi3fsbqngfynetqtw4w5hyd.onion
http://77nrxelcwh47yikvpaz2rvtsten4sen2elybo5r5st6wlxsbitv255qd.onion/
Targets
-
-
Target
temp.exe
-
Size
147KB
-
MD5
b32a8951fc4c2e4c2d63d17200ca0032
-
SHA1
655b5a05bbf27b16f1c8fbad2924a76df968dda8
-
SHA256
7d67c8711b4cad0f585604ff3f9f8f40359e4f8e1524e152f50159b0f56d0952
-
SHA512
0df9c6ddd90393cc8e669ddc50cdd285e4c693a51141bd352985d78f48afca5017120ea50c57a56f45f13a90e2dccf64110a2fc23a5fe14ac59b6892a316dd92
-
SSDEEP
3072:K6glyuxE4GsUPnliByocWepW77ys/nX4OEB:K6gDBGpvEByocWeG77/nX4NB
-
Brain Cipher
Ransomware family based on Lockbit that was first observed in June 2024.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-