General
-
Target
bdbae7b34275dd644a6f358ac3054d492baabe57b58f223bc621a06b9d348759
-
Size
1.2MB
-
Sample
240920-2b1x6s1fqg
-
MD5
dc37db4851be7183c7679f53318ef45a
-
SHA1
3ec23cb77f2994d5671aed9493b9dd5dba5a4ea3
-
SHA256
bdbae7b34275dd644a6f358ac3054d492baabe57b58f223bc621a06b9d348759
-
SHA512
d5c3315f31dfab439baa6bae6978ff5b44f534ce1d85ece1616e1147485951fbb1bfbbe940ec7f056405b90c3a5a6fde56cb03743224522414ffa59e6461f89b
-
SSDEEP
24576:WWLBAAWIokYEfR60313fx8nWcMhd5iMZ/4byjeaXStR1NxNAtJXalMYGMGOV+yhf:L1AtkT9132WHhd5L/gyjeay96JqaYGgR
Static task
static1
Behavioral task
behavioral1
Sample
bdbae7b34275dd644a6f358ac3054d492baabe57b58f223bc621a06b9d348759.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bdbae7b34275dd644a6f358ac3054d492baabe57b58f223bc621a06b9d348759.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Users\Admin\3D Objects\HOW TO BACK FILES.txt
targetcompany
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion/mallox/privateSignin
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion
Targets
-
-
Target
bdbae7b34275dd644a6f358ac3054d492baabe57b58f223bc621a06b9d348759
-
Size
1.2MB
-
MD5
dc37db4851be7183c7679f53318ef45a
-
SHA1
3ec23cb77f2994d5671aed9493b9dd5dba5a4ea3
-
SHA256
bdbae7b34275dd644a6f358ac3054d492baabe57b58f223bc621a06b9d348759
-
SHA512
d5c3315f31dfab439baa6bae6978ff5b44f534ce1d85ece1616e1147485951fbb1bfbbe940ec7f056405b90c3a5a6fde56cb03743224522414ffa59e6461f89b
-
SSDEEP
24576:WWLBAAWIokYEfR60313fx8nWcMhd5iMZ/4byjeaXStR1NxNAtJXalMYGMGOV+yhf:L1AtkT9132WHhd5L/gyjeay96JqaYGgR
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
TargetCompany,Mallox
TargetCompany (aka Mallox) is a ransomware which encrypts files using a combination of ChaCha20, AES-128, and Curve25519, first seen in June 2021.
-
Modifies boot configuration data using bcdedit
-
Renames multiple (6535) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-