General
-
Target
RNSM00432.7z
-
Size
31.2MB
-
Sample
241026-pk5lha1rek
-
MD5
be484eefb48a6c7ea47da9807a26f1d9
-
SHA1
92e843045bc7f796706a5c7c8af65bcc919e01da
-
SHA256
ba1d49f1423ab5fb6918cb61bf61b5acc50bd1ad99838a3dbba59af99e629e77
-
SHA512
2ed6f29decd1916963048e57f99c1d5b340a0961b9edcbeab1d6f01fa527a853cac797f457ba92363003ee8392d829a4d5f345b83bba426223250c4eea5547a5
-
SSDEEP
786432:6513OAEXjyZZp2jHShJxZs81quWVahRSItfZUjWkO3:q3OAGjyZb2jH2JxZ7dsERSEfZ9z
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00432.7z
Resource
win10v2004-20241007-en
Malware Config
Extracted
crimsonrat
167.86.89.53
Extracted
urelas
112.175.88.207
112.175.88.208
Extracted
C:\Users\Admin\Desktop\readme.txt
https://ranzylock.hk/2X258GEF
http://a6a5b4ppnkrio3nikyutfexbc6y5dc6kfhj3jr32kdwbryr2lempkuyd.onion/2X258GEF
Extracted
C:\Users\Admin\3D Objects\LOCKY-README.txt
http://pylockyrkumqih5l.onion/index.php
http://pylockyrkumqih5l.onion/index.php에서
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\first_party_sets.db
http://pylockyrkumqih5l.onion/index.php
http://pylockyrkumqih5l.onion/index.php에서
Extracted
C:\Users\Admin\Desktop\LegionReadMe.txt
131fjhrB4wH8j6adZXudp1Wn23pR33tpAh
http://mail2tor2zyjdctd.onion/
Targets
-
-
Target
RNSM00432.7z
-
Size
31.2MB
-
MD5
be484eefb48a6c7ea47da9807a26f1d9
-
SHA1
92e843045bc7f796706a5c7c8af65bcc919e01da
-
SHA256
ba1d49f1423ab5fb6918cb61bf61b5acc50bd1ad99838a3dbba59af99e629e77
-
SHA512
2ed6f29decd1916963048e57f99c1d5b340a0961b9edcbeab1d6f01fa527a853cac797f457ba92363003ee8392d829a4d5f345b83bba426223250c4eea5547a5
-
SSDEEP
786432:6513OAEXjyZZp2jHShJxZs81quWVahRSItfZUjWkO3:q3OAGjyZb2jH2JxZ7dsERSEfZ9z
-
Crimsonrat family
-
Detected LegionLocker ransomware
Sample contains strings associated with the LegionLocker family.
-
Legionlocker family
-
Modifies WinLogon for persistence
-
Modifies visibility of file extensions in Explorer
-
Modifies visiblity of hidden/system files in Explorer
-
Urelas family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Renames multiple (174) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Disables RegEdit via registry modification
-
Disables use of System Restore points
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Modifies file permissions
-
Modifies system executable filetype association
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
File and Directory Permissions Modification
1Hide Artifacts
2Hidden Files and Directories
2Modify Registry
6Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1