General
-
Target
k.exe
-
Size
7.7MB
-
Sample
240928-jm698avaqn
-
MD5
a652ce5220cd49b6f763768dfa5f2a31
-
SHA1
8b34c4ec496f910e2c70747ec73dad366a39006a
-
SHA256
18e1937edc999cd87fa77cf26ac15b01421c4bf057ee5e0d8a659690f0db1964
-
SHA512
62108c8f26fc7a8f3992bf3ee3957125fb806afe7dd54e5e3dce3bb58be808d1c7702c8aae0c62a90efc61777c9b0e24232166c96766765a8f70059d7b1e5b4f
-
SSDEEP
98304:bwuFB5I0/A/636tEWlv5ZbNelTmLOqHBwiXM2Ol2GhZ:rW0/A/kIHOqKUM242WZ
Behavioral task
behavioral1
Sample
k.exe
Resource
win11-20240802-en
Malware Config
Extracted
thunderkittyransomware
https://discord.com/api/webhooks/1289254488690921604/T_8SdWKaS6HoADGM7JVaF6jcngj3AwNmj_uW_5n-JDG_BMkPSaslAw0RSFMU0AJAbScS
Extracted
C:\Users\Admin\Desktop\README-NOW.txt
https://changenow.io/buy/monero
https://bit2me.com/buy-monero
https://guardarian.com/buy-xmr
Targets
-
-
Target
k.exe
-
Size
7.7MB
-
MD5
a652ce5220cd49b6f763768dfa5f2a31
-
SHA1
8b34c4ec496f910e2c70747ec73dad366a39006a
-
SHA256
18e1937edc999cd87fa77cf26ac15b01421c4bf057ee5e0d8a659690f0db1964
-
SHA512
62108c8f26fc7a8f3992bf3ee3957125fb806afe7dd54e5e3dce3bb58be808d1c7702c8aae0c62a90efc61777c9b0e24232166c96766765a8f70059d7b1e5b4f
-
SSDEEP
98304:bwuFB5I0/A/636tEWlv5ZbNelTmLOqHBwiXM2Ol2GhZ:rW0/A/kIHOqKUM242WZ
-
Renames multiple (2268) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1