General
-
Target
penisware2.exe
-
Size
4KB
-
Sample
241027-wkcn2s1ejk
-
MD5
e0d21602c9cf14e35c33f9cc4f6958ae
-
SHA1
0d2b10cb46d1a5def7665527ece2e40210cd4938
-
SHA256
c5b23ac2026c16bfa8c5783cdc8f980e46d146666eb5e5fbb8f5a84d029a4b8a
-
SHA512
03ceb24c9f080fdcd17f2be8c83ef23b3ab06b2d47e9d187c4ec2562841f35971fafec750da0c04b883eda4cb1e2fe52e333c7422039fa8b297d543fab7bd054
-
SSDEEP
96:1j9jwIjYjUDK/D5DMF+BOiVAZpCZLqmePrRU9PaQxJbGD:1j9jhjYjIK/Vo+t6kZ2mePry9ieJGD
Static task
static1
Behavioral task
behavioral1
Sample
penisware2.html
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
penisware2.exe
-
Size
4KB
-
MD5
e0d21602c9cf14e35c33f9cc4f6958ae
-
SHA1
0d2b10cb46d1a5def7665527ece2e40210cd4938
-
SHA256
c5b23ac2026c16bfa8c5783cdc8f980e46d146666eb5e5fbb8f5a84d029a4b8a
-
SHA512
03ceb24c9f080fdcd17f2be8c83ef23b3ab06b2d47e9d187c4ec2562841f35971fafec750da0c04b883eda4cb1e2fe52e333c7422039fa8b297d543fab7bd054
-
SSDEEP
96:1j9jwIjYjUDK/D5DMF+BOiVAZpCZLqmePrRU9PaQxJbGD:1j9jhjYjIK/Vo+t6kZ2mePry9ieJGD
-
Chimera
Ransomware which infects local and network files, often distributed via Dropbox links.
-
Chimera Ransomware Loader DLL
Drops/unpacks executable file which resembles Chimera's Loader.dll.
-
Chimera family
-
Renames multiple (3271) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1