General
-
Target
RNSM00405.7z
-
Size
7.3MB
-
Sample
241028-zd42haxbjj
-
MD5
b1aad99a66608f32a66673ccd4d83ea5
-
SHA1
14b49720f6b52710fe881000c723ffc6a79b898d
-
SHA256
f9af4c12ac22ca9e1fc57a51895652c898d77379703c8204526af7252bd90d20
-
SHA512
01e5b8c9b62eadaa48df41a36f2a819b4c592989b34755a53b9d0e2f70916f079d5bbb982278c9cd469678ccbd325729a3c8ae45953b07fc4d92ebdda811deea
-
SSDEEP
196608:FHWFXjJypQ3mRUaWwGw11q5eRTmLk+F8pjFe/CBuc:FEzoeQTWA16eRyQPKqoc
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00405.7z
Resource
win10v2004-20241007-en
Malware Config
Extracted
azorult
http://tranpip.com/hoi/index.php
Extracted
C:\Users\Admin\Desktop\mnBop_readme_.txt
avaddon
http://avaddongun7rngel.onion
http://avaddonbotrxmuyl.onion
Extracted
C:\Users\Admin\Downloads\mnBop_readme_.txt
avaddon
http://avaddongun7rngel.onion
http://avaddonbotrxmuyl.onion
Extracted
C:\mnBop_readme_.txt
avaddon
http://avaddongun7rngel.onion
http://avaddonbotrxmuyl.onion
Extracted
C:\Users\Public\Documents\!!!_READ_ME_09C70E4B_!!!.txt
https://prnt.sc/va9w5v
https://prnt.sc/vam4mz
https://prnt.sc/val3ll
https://prnt.sc/vaa5kh
https://prnt.sc/va9xdb
https://prnt.sc/va9z18
https://prnt.sc/va9wwj
https://prnt.sc/vaad5d
http://p6o7m73ujalhgkiv.onion/?tfR4tkhpcE2pUg
http://rgnar43spcnsocswaw22lmk7jnget5f6vow7kqmnf4jc6hfwpiwoajid.onion/client/?8035A17A1e1cdaABB8BfDecEC0e94FA224C1Fc86D09C60540E56e972EDa7327c
Targets
-
-
Target
RNSM00405.7z
-
Size
7.3MB
-
MD5
b1aad99a66608f32a66673ccd4d83ea5
-
SHA1
14b49720f6b52710fe881000c723ffc6a79b898d
-
SHA256
f9af4c12ac22ca9e1fc57a51895652c898d77379703c8204526af7252bd90d20
-
SHA512
01e5b8c9b62eadaa48df41a36f2a819b4c592989b34755a53b9d0e2f70916f079d5bbb982278c9cd469678ccbd325729a3c8ae45953b07fc4d92ebdda811deea
-
SSDEEP
196608:FHWFXjJypQ3mRUaWwGw11q5eRTmLk+F8pjFe/CBuc:FEzoeQTWA16eRyQPKqoc
-
Avaddon
Ransomware-as-a-service first released in June 2020 and currently expanding its userbase among criminal actors.
-
Avaddon family
-
Avaddon payload
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Detected Xorist Ransomware
-
GandCrab payload
-
Gandcrab family
-
Xorist family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Renames multiple (1286) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Clears Network RDP Connection History and Configurations
Remove evidence of malicious network connections to clean up operations traces.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
System Services
1Service Execution
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Pre-OS Boot
1Bootkit
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
2Indicator Removal
3Clear Network Connection History and Configurations
1File Deletion
2Modify Registry
4Pre-OS Boot
1Bootkit
1Discovery
Network Share Discovery
1Peripheral Device Discovery
2Query Registry
3Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1System Time Discovery
1