General

  • Target

    428472f3ed4859f706c6ef391cfe701bd069ca1daf000900bb71902fcaa1f64eN

  • Size

    5.9MB

  • Sample

    241009-qkc2xszdmh

  • MD5

    c3b6537f8a5376f1b317924689f07320

  • SHA1

    bb69f960938848763a3276691f55649d8aa226b2

  • SHA256

    428472f3ed4859f706c6ef391cfe701bd069ca1daf000900bb71902fcaa1f64e

  • SHA512

    5ee2868d688326d62745b43da35439063529c3cdfcbbd43e017ccd33bfc121fd03c8afa9470beb39dd622a554e9dd9d84286a27d1163a094962d6bec264640eb

  • SSDEEP

    98304:6trbTA1VtrbTA1AtrbTA1f6hViFmoQY9uoN6LzaLs6hVh6hV:Mc1Hc1Wc1HFmonN7

Malware Config

Targets

    • Target

      428472f3ed4859f706c6ef391cfe701bd069ca1daf000900bb71902fcaa1f64eN

    • Size

      5.9MB

    • MD5

      c3b6537f8a5376f1b317924689f07320

    • SHA1

      bb69f960938848763a3276691f55649d8aa226b2

    • SHA256

      428472f3ed4859f706c6ef391cfe701bd069ca1daf000900bb71902fcaa1f64e

    • SHA512

      5ee2868d688326d62745b43da35439063529c3cdfcbbd43e017ccd33bfc121fd03c8afa9470beb39dd622a554e9dd9d84286a27d1163a094962d6bec264640eb

    • SSDEEP

      98304:6trbTA1VtrbTA1AtrbTA1f6hViFmoQY9uoN6LzaLs6hVh6hV:Mc1Hc1Wc1HFmonN7

    • Chaos

      Ransomware family first seen in June 2021.

    • Chaos Ransomware

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies boot configuration data using bcdedit

    • Deletes backup catalog

      Uses wbadmin.exe to inhibit system recovery.

    • Disables Task Manager via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Sets desktop wallpaper using registry

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks