General
-
Target
2b693de1eba37e3b56c1c989a5906dab23526cad9873e400532a66a75e8e9d00
-
Size
345KB
-
Sample
241024-y2hmqsshng
-
MD5
87dd1c2224ef79ce8fce59caa0bb1964
-
SHA1
b183d956eb2fab6ece59fd9768b78f0ab172979a
-
SHA256
2b693de1eba37e3b56c1c989a5906dab23526cad9873e400532a66a75e8e9d00
-
SHA512
d0c1036023b004d58052526892d35d726eb37035fc3e1a2803db628fcd20708b9da32501057655e134e50707e59729f7181d386f3b2b81187de0f5955a9efcce
-
SSDEEP
6144:KYBTq90cteSShbS9cYbNYuXjaPNIqWAPk+O7HkXK6k:KYBDcteSSNS9cGMSqWAPk+Orkk
Behavioral task
behavioral1
Sample
2b693de1eba37e3b56c1c989a5906dab23526cad9873e400532a66a75e8e9d00.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2b693de1eba37e3b56c1c989a5906dab23526cad9873e400532a66a75e8e9d00.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2b693de1eba37e3b56c1c989a5906dab23526cad9873e400532a66a75e8e9d00
-
Size
345KB
-
MD5
87dd1c2224ef79ce8fce59caa0bb1964
-
SHA1
b183d956eb2fab6ece59fd9768b78f0ab172979a
-
SHA256
2b693de1eba37e3b56c1c989a5906dab23526cad9873e400532a66a75e8e9d00
-
SHA512
d0c1036023b004d58052526892d35d726eb37035fc3e1a2803db628fcd20708b9da32501057655e134e50707e59729f7181d386f3b2b81187de0f5955a9efcce
-
SSDEEP
6144:KYBTq90cteSShbS9cYbNYuXjaPNIqWAPk+O7HkXK6k:KYBDcteSSNS9cGMSqWAPk+Orkk
-
Chaos Ransomware
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1