General
-
Target
06699c98ed2ef759b2434ac5777a2886b966c0ffa1c96c046f5cde77fe833784.exe
-
Size
346KB
-
Sample
241106-cg2dfsvqdp
-
MD5
9099859494363864de61fb30d6c201e6
-
SHA1
90378c5fd151128287c12eea0ea3761833b0ad03
-
SHA256
06699c98ed2ef759b2434ac5777a2886b966c0ffa1c96c046f5cde77fe833784
-
SHA512
cae8c4970c6d8891d2da8924e6ba2331242c112ee5eec5823d8e55c29b40822b0f4287b64e5b6b5d71c0aa2cb8b998ac4533e2dd6326af820f29e9e5eadd59ba
-
SSDEEP
6144:lbjhsyXpHunpQE/T/iSIDexeohXdbVeb:7XpOpplI8eoT
Static task
static1
Behavioral task
behavioral1
Sample
06699c98ed2ef759b2434ac5777a2886b966c0ffa1c96c046f5cde77fe833784.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
06699c98ed2ef759b2434ac5777a2886b966c0ffa1c96c046f5cde77fe833784.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
F:\$RECYCLE.BIN\HOW TO BACK FILES.txt
targetcompany
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion/mallox/privateSignin
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion
Extracted
C:\$Recycle.Bin\HOW TO BACK FILES.txt
targetcompany
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion/mallox/privateSignin
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion
Targets
-
-
Target
06699c98ed2ef759b2434ac5777a2886b966c0ffa1c96c046f5cde77fe833784.exe
-
Size
346KB
-
MD5
9099859494363864de61fb30d6c201e6
-
SHA1
90378c5fd151128287c12eea0ea3761833b0ad03
-
SHA256
06699c98ed2ef759b2434ac5777a2886b966c0ffa1c96c046f5cde77fe833784
-
SHA512
cae8c4970c6d8891d2da8924e6ba2331242c112ee5eec5823d8e55c29b40822b0f4287b64e5b6b5d71c0aa2cb8b998ac4533e2dd6326af820f29e9e5eadd59ba
-
SSDEEP
6144:lbjhsyXpHunpQE/T/iSIDexeohXdbVeb:7XpOpplI8eoT
Score10/10-
TargetCompany,Mallox
TargetCompany (aka Mallox) is a ransomware which encrypts files using a combination of ChaCha20, AES-128, and Curve25519, first seen in June 2021.
-
Targetcompany family
-
Modifies boot configuration data using bcdedit
-
Renames multiple (244) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-