General
-
Target
Reader+x86.img
-
Size
442KB
-
Sample
240909-ygbzfswgjl
-
MD5
1b4bbc6a2cfe628395c5d670d5ef470d
-
SHA1
ef2565c789316612d8103056cec25f77674d78d1
-
SHA256
0f8de2a116f590ace3a818302d2531af9f3c972816638c92773048c640807acc
-
SHA512
c6d31110810087a8d10f0449963b41178b25d36c9c4f6ce5afbc08c9a71de6397ab57e48704d4c9967804c9bfc6f13531f5622a3f30128ef2e999368ce8f5e16
-
SSDEEP
12288:ktgKIxfbbezR1WpOJJMjihU030/qRMrKSk:kupxTSzRKODPhDufN
Static task
static1
Behavioral task
behavioral1
Sample
Reader.lnk
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Reader.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
red.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
red.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
F:\$RECYCLE.BIN\HOW TO BACK FILES.txt
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion/mallox/privateSignin
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion
Extracted
\Device\HarddiskVolume1\HOW TO BACK FILES.txt
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion/mallox/privateSignin
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion
Targets
-
-
Target
Reader.lnk
-
Size
2KB
-
MD5
66bb9363e23c7ef2d16c89cd654b491e
-
SHA1
c20e8d536804cf97584eec93d9a89c09541155bc
-
SHA256
61f36c5ae038faa2b58a9a17b464d01414b4265e46634f353319c471d0a35789
-
SHA512
b7a751e49218230d574ca9cc4cbbb1995d89798268124b1617889c7558c66902f81fdb77a299edcc6d96452cec81adb76768172710e00c9272d30821ab0089c5
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
-
-
Target
red.exe
-
Size
376KB
-
MD5
120c6ddfc24274b6e2e3a1ba7dc519ab
-
SHA1
29936b1aa952a89905bf0f7b7053515fd72d8c5c
-
SHA256
2289706f678585059502a24283e0f55d56cf477524753c606f64825bba66fca8
-
SHA512
dd9b2fb6cd5f6f044daa80ef634078849032ebbdbd1d293bb7bcb0270aa8b7360c39addb0826c7a3ddc8714b559bf8828e8e506ac91bcb4702a72f4c8ec4850a
-
SSDEEP
6144:KFtgKBIxGS/bbWGGJK8PpzR1WpOJOQMeEBwhUg5bBDNPbsP/qrscpyj4CVKSkn:+tgKIxfbbezR1WpOJJMjihU030/qRMra
-
TargetCompany,Mallox
TargetCompany (aka Mallox) is a ransomware which encrypts files using a combination of ChaCha20, AES-128, and Curve25519, first seen in June 2021.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (7277) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Windows Management Instrumentation
1Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
1