General
-
Target
c7c4ba1401f1bc59b0ac4f6f5732d224a610dafd586418bc8afdb9fc67dc32d1
-
Size
229KB
-
Sample
241120-l5qfjazmbq
-
MD5
6bec2b3d05eff30b1a92c839fe4998ba
-
SHA1
c775bffb803bbd887b3bdfa9db6bdbb354d9641a
-
SHA256
c7c4ba1401f1bc59b0ac4f6f5732d224a610dafd586418bc8afdb9fc67dc32d1
-
SHA512
0080b9b58960fe70c862b77ab907a7f38d578e8c42e7f352acfb976dd947be2d095757df86e2d93fbdb419be445a3fdd01efaf29ba5dd6bf5e079f74acb53109
-
SSDEEP
6144:wbYeXRacFSrSVp2CWnxj78jpSwQtp17RVzKVg4bj:KPRHFR9Wnxj78VSwiplYbj
Static task
static1
Behavioral task
behavioral1
Sample
新建文件夹/x.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
新建文件夹/x.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\$Recycle.Bin\HOW TO BACK FILES.txt
targetcompany
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion/mallox/privateSignin
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion
Extracted
\Device\HarddiskVolume1\HOW TO BACK FILES.txt
targetcompany
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion/mallox/privateSignin
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion
Targets
-
-
Target
新建文件夹/x.exe._hw_
-
Size
484KB
-
MD5
5d279e53008bcf128c79d18913073440
-
SHA1
710f5671c5326c9b722a69284a30039c2bd00628
-
SHA256
380e081dbf5550146db4e9d874a796f6d5d80c49b5cbe50f9247a556192ea129
-
SHA512
f093db7036d75ee03c0cf6b170b1d7206ee81d57d199df69930979c15ebd5fcc365333be514abea69b196faaa592cd47ff2f778875521060c3ebe4bf931c3627
-
SSDEEP
6144:40Kf3dwCiJOp5DzwQTSmKMuYREY4nLy95/YjVD+IyaFV/GCc7IfxB7f:255QySNaEY4nW9sl+ja3/GCT
Score10/10-
TargetCompany,Mallox
TargetCompany (aka Mallox) is a ransomware which encrypts files using a combination of ChaCha20, AES-128, and Curve25519, first seen in June 2021.
-
Targetcompany family
-
Modifies boot configuration data using bcdedit
-
Renames multiple (7156) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-