General
-
Target
RNSM00417.7z
-
Size
26.6MB
-
Sample
241028-tx9hfa1nct
-
MD5
3827bb44108eb019f3d69ec7c9a4c85b
-
SHA1
3cc6563e65ff0618cee4bcbb8637db128af32c0a
-
SHA256
0c05113830f590ea0e628c188bf2b0d9554c6e6bb3bb80178b193caf5bb41c96
-
SHA512
2e575b82c5f1d25233f5ef8ec2042a54a0b21127e73bea1720e8189f57d709879be7c693456217c8d65bc55ba89e51370c3f3fe603fbd3ff07e247c8da5e6caa
-
SSDEEP
786432:bFe9AF5zQqfplDfrIxRMmGBN63q8bv5ceUPt/q:bFVpjlDfrIxRMzw3lme
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00417.7z
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
Lolhacker05@!!
Extracted
C:\Users\Admin\Documents\__READ_ME_TO_RECOVER_YOUR_FILES.txt
3QtbAioBSw249J5xsGd1sCqTqhdDX4CD9L
Extracted
C:\Users\Public\WERE_MY _FILES.txt
globeimposter
httpps://www.torproject.org/
http://helpqvrg3cc5mvb3.onion/
Extracted
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\How To Decrypt Files.hta
class='mark'>[email protected]</span></div></li></ul></div><div
class='mark'>[email protected]</span></li><li>The
Targets
-
-
Target
RNSM00417.7z
-
Size
26.6MB
-
MD5
3827bb44108eb019f3d69ec7c9a4c85b
-
SHA1
3cc6563e65ff0618cee4bcbb8637db128af32c0a
-
SHA256
0c05113830f590ea0e628c188bf2b0d9554c6e6bb3bb80178b193caf5bb41c96
-
SHA512
2e575b82c5f1d25233f5ef8ec2042a54a0b21127e73bea1720e8189f57d709879be7c693456217c8d65bc55ba89e51370c3f3fe603fbd3ff07e247c8da5e6caa
-
SSDEEP
786432:bFe9AF5zQqfplDfrIxRMmGBN63q8bv5ceUPt/q:bFVpjlDfrIxRMzw3lme
-
Detect MafiaWare666 ransomware
-
Globeimposter family
-
Locky family
-
MafiaWare666 Ransomware
MafiaWare666 is ransomware written in C# with multiple variants.
-
Mafiaware666 family
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies WinLogon for persistence
-
Modifies security service
-
Modiloader family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
ModiLoader First Stage
-
Renames multiple (1663) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Blocklisted process makes network request
-
Disables Task Manager via registry modification
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Server Software Component: Terminal Services DLL
-
Allows Network login with blank passwords
Allows local user accounts with blank passwords to access device from the network.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Hijack Execution Flow: Executable Installer File Permissions Weakness
Possible Turn off User Account Control's privilege elevation for standard users.
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Modifies WinLogon
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Hide Artifacts: Hidden Files and Directories
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1File and Directory Permissions Modification
1Hide Artifacts
2Hidden Files and Directories
2Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Indicator Removal
1File Deletion
1Modify Registry
10Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Peripheral Device Discovery
2Query Registry
8Remote System Discovery
1System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2