General
-
Target
Chucky.7z
-
Size
69KB
-
Sample
240829-l9a7eawdjd
-
MD5
d079bb19c1913f6a24db60d7bb3e97d5
-
SHA1
1b0894e8805482cc1d9eb3c519bc4ba585d17fe8
-
SHA256
44e0cc6647e5b12f7a22b454a1de7d54ecd71b5648c9d8854432d969441b4def
-
SHA512
0ea8c89add9b99306cffbdf2f22c1ef6c65c8c43561a5ea338463d89dd2d83178b12a6a5f218009304af27e38b1222cf51d9e3d20c8b98e9e4e004e18568ff89
-
SSDEEP
1536:xITZt8XvjPyoMOnKCbhP7hjTI+UvNJR8bLR/xtZ4ZD1nfW20wQ4qxM:fLbRU34D4ZD1f1lLX
Behavioral task
behavioral1
Sample
Chucky.exe
Resource
win7-20240708-en
Malware Config
Extracted
C:\Users\Admin\Desktop\PLZ READ!.txt
chaos
Targets
-
-
Target
Chucky.exe
-
Size
181KB
-
MD5
4490880e581ac1f7bee0b37136304af9
-
SHA1
e3916209ca93d0425a974cc47c31dcb5887b8428
-
SHA256
b88c6dd5815cb65b0b813e6369da9114d512bd6088a42f941c17d4048cffa864
-
SHA512
76d246821f50b6108f9b8fcccd5915db5b9735387af8e917a8826e96544f1f94c0deac8c1781eb0864e091dd471d77dbf9bab8403e77c5184ef263d9a0c4f7fe
-
SSDEEP
3072:J3kAEgr9iA72FNYdW5Z6bdur+eoyN5Ltolk/fC2KbnRZ5e3XHo6vQsoLzCs:vr9iBIoIZqJW0fdKDROHHo8eLzC
Score10/10-
Chaos Ransomware
-
Drops startup file
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-