General

  • Target

    Output.exe

  • Size

    886KB

  • Sample

    241031-wj81vssaqd

  • MD5

    5de66177f354c6897c28610c4f7bae57

  • SHA1

    e8ad1bee7ca5c991d1837eb59d0c9b4033e055bf

  • SHA256

    2b685da51e11e912a197f6b099cc129ea596e0a17e1acda327a14da2f29cc14d

  • SHA512

    a4b7044c28e0ead07ade9325de64e0e1e9069d27ab4d228df4acc84952a9c9f7e05e04cdae7adb05322e413756cf906163ccf728564258ad21d558da1da471e0

  • SSDEEP

    24576:pIRvCHulB7EdTNb8aJFWKtJ8Bx2BIQPGfK9wNJnkSDSvmEF:pIRvCOlBOF8aJFWKtJ8Bx2BXSK6NJ

Malware Config

Extracted

Family

xworm

C2

nohicsq.localto.net:3985

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Extracted

Path

C:\Users\Admin\Documents\read_it.txt

Family

chaos

Ransom Note
----> Chaos is multi language ransomware. Translate your note to any language <---- All of your files have been encrypted Your computer was infected with a ransomware virus. Your files have been encrypted and you won't be able to decrypt them without our help.What can I do to get my files back?You can buy our special decryption software, this software will allow you to recover all of your data and remove the ransomware from your computer.The price for the software is $1,500. Payment can be made in Bitcoin only. How do I pay, where do I get Bitcoin? Purchasing Bitcoin varies from country to country, you are best advised to do a quick google search yourself to find out how to buy Bitcoin. Many of our customers have reported these sites to be fast and reliable: Coinmama - hxxps://www.coinmama.com Bitpanda - hxxps://www.bitpanda.com Payment informationAmount: 0.00138959 BTC Bitcoin Address: bc1q7njx7z489vx9444agzf759u4q46vfgtydzwyll

Targets

    • Target

      Output.exe

    • Size

      886KB

    • MD5

      5de66177f354c6897c28610c4f7bae57

    • SHA1

      e8ad1bee7ca5c991d1837eb59d0c9b4033e055bf

    • SHA256

      2b685da51e11e912a197f6b099cc129ea596e0a17e1acda327a14da2f29cc14d

    • SHA512

      a4b7044c28e0ead07ade9325de64e0e1e9069d27ab4d228df4acc84952a9c9f7e05e04cdae7adb05322e413756cf906163ccf728564258ad21d558da1da471e0

    • SSDEEP

      24576:pIRvCHulB7EdTNb8aJFWKtJ8Bx2BIQPGfK9wNJnkSDSvmEF:pIRvCOlBOF8aJFWKtJ8Bx2BXSK6NJ

    • Chaos

      Ransomware family first seen in June 2021.

    • Chaos Ransomware

    • Chaos family

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks