General
-
Target
2024-10-02_d4b924a9d396ce143aac15ccb4be8041_makop
-
Size
48KB
-
Sample
241002-rsf9zsvcmd
-
MD5
d4b924a9d396ce143aac15ccb4be8041
-
SHA1
30d8deaca70759fcb0159042c98a2ef41831edf1
-
SHA256
585829269d87b4b63c3cc4c6d855c0077190c2ae888e1e52aad013e2f1eb652a
-
SHA512
47b5a3149d4b32657975cabfb521a735535b7f5abb20b6392b582ddab4716314073b70aecc1fe887c7cf7211b43aba4f2977b9393e2ef9034a5d23b2ca76d388
-
SSDEEP
768:K8Z+47PKmQjYz3KgZYakDroDDl1lUkGgQ7WJxXv7zDOY3zqlrKKMzkU5f8i3:K8KmQjo3nkHoF1YWP733z5f5f/
Behavioral task
behavioral1
Sample
2024-10-02_d4b924a9d396ce143aac15ccb4be8041_makop.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-02_d4b924a9d396ce143aac15ccb4be8041_makop.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\+README-WARNING+.txt
Extracted
C:\Program Files\Common Files\microsoft shared\ClickToRun\+README-WARNING+.txt
Targets
-
-
Target
2024-10-02_d4b924a9d396ce143aac15ccb4be8041_makop
-
Size
48KB
-
MD5
d4b924a9d396ce143aac15ccb4be8041
-
SHA1
30d8deaca70759fcb0159042c98a2ef41831edf1
-
SHA256
585829269d87b4b63c3cc4c6d855c0077190c2ae888e1e52aad013e2f1eb652a
-
SHA512
47b5a3149d4b32657975cabfb521a735535b7f5abb20b6392b582ddab4716314073b70aecc1fe887c7cf7211b43aba4f2977b9393e2ef9034a5d23b2ca76d388
-
SSDEEP
768:K8Z+47PKmQjYz3KgZYakDroDDl1lUkGgQ7WJxXv7zDOY3zqlrKKMzkU5f8i3:K8KmQjo3nkHoF1YWP733z5f5f/
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (8319) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1System Services
1Service Execution
1Windows Management Instrumentation
1Defense Evasion
Direct Volume Access
1Impair Defenses
1Indicator Removal
3File Deletion
3Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1