General
-
Target
e75c2dd0e0e65646911805705bbef7300f2af8f6086608572f6a665667558a3a
-
Size
337KB
-
Sample
241021-e35dcaybmd
-
MD5
38bc06d7e66386671deb9829275b262f
-
SHA1
32fbedbb51026b46ce5d1397289f31f18385a1c0
-
SHA256
e75c2dd0e0e65646911805705bbef7300f2af8f6086608572f6a665667558a3a
-
SHA512
c7019f0888c91cbd7ad287bfd41203af0cd4d2e68a093700f3dbf442a437bb8236ffb146e3d1d11e804f5f4471042876e1f3f8eaf6e852c4213b80d45c65176b
-
SSDEEP
6144:SE+yclwQKjdn+WPtYVJIoBfv2X+t4xWoub:SBdlwHRn+WlYV+W2X+t4xWP
Static task
static1
Behavioral task
behavioral1
Sample
e75c2dd0e0e65646911805705bbef7300f2af8f6086608572f6a665667558a3a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e75c2dd0e0e65646911805705bbef7300f2af8f6086608572f6a665667558a3a.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Admin\Documents\read_it.txt
https://tox.chat/download.html
Targets
-
-
Target
e75c2dd0e0e65646911805705bbef7300f2af8f6086608572f6a665667558a3a
-
Size
337KB
-
MD5
38bc06d7e66386671deb9829275b262f
-
SHA1
32fbedbb51026b46ce5d1397289f31f18385a1c0
-
SHA256
e75c2dd0e0e65646911805705bbef7300f2af8f6086608572f6a665667558a3a
-
SHA512
c7019f0888c91cbd7ad287bfd41203af0cd4d2e68a093700f3dbf442a437bb8236ffb146e3d1d11e804f5f4471042876e1f3f8eaf6e852c4213b80d45c65176b
-
SSDEEP
6144:SE+yclwQKjdn+WPtYVJIoBfv2X+t4xWoub:SBdlwHRn+WlYV+W2X+t4xWP
-
Chaos Ransomware
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1Windows Management Instrumentation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1