General

  • Target

    penisware2.exe

  • Size

    4KB

  • Sample

    241027-wkcn2s1ejk

  • MD5

    e0d21602c9cf14e35c33f9cc4f6958ae

  • SHA1

    0d2b10cb46d1a5def7665527ece2e40210cd4938

  • SHA256

    c5b23ac2026c16bfa8c5783cdc8f980e46d146666eb5e5fbb8f5a84d029a4b8a

  • SHA512

    03ceb24c9f080fdcd17f2be8c83ef23b3ab06b2d47e9d187c4ec2562841f35971fafec750da0c04b883eda4cb1e2fe52e333c7422039fa8b297d543fab7bd054

  • SSDEEP

    96:1j9jwIjYjUDK/D5DMF+BOiVAZpCZLqmePrRU9PaQxJbGD:1j9jhjYjIK/Vo+t6kZ2mePry9ieJGD

Malware Config

Targets

    • Target

      penisware2.exe

    • Size

      4KB

    • MD5

      e0d21602c9cf14e35c33f9cc4f6958ae

    • SHA1

      0d2b10cb46d1a5def7665527ece2e40210cd4938

    • SHA256

      c5b23ac2026c16bfa8c5783cdc8f980e46d146666eb5e5fbb8f5a84d029a4b8a

    • SHA512

      03ceb24c9f080fdcd17f2be8c83ef23b3ab06b2d47e9d187c4ec2562841f35971fafec750da0c04b883eda4cb1e2fe52e333c7422039fa8b297d543fab7bd054

    • SSDEEP

      96:1j9jwIjYjUDK/D5DMF+BOiVAZpCZLqmePrRU9PaQxJbGD:1j9jhjYjIK/Vo+t6kZ2mePry9ieJGD

    • Chimera

      Ransomware which infects local and network files, often distributed via Dropbox links.

    • Chimera Ransomware Loader DLL

      Drops/unpacks executable file which resembles Chimera's Loader.dll.

    • Chimera family

    • Renames multiple (3271) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks