General
-
Target
2024-11-22_fcd522ea627ddb3d9a49a2c8b938ef6a_mafia
-
Size
323KB
-
Sample
241122-x42yqaxjct
-
MD5
fcd522ea627ddb3d9a49a2c8b938ef6a
-
SHA1
a6a7186701bdd088c0a0aa0d879121bcdd9f60c0
-
SHA256
6f88f48ff68b6d6c6f66e6af25bd0bcf0071d9b224a696f0119a7469d9036e66
-
SHA512
c96dc8672fbc1e668f08c7ae0462151a9637aa34e83fb9f9e639ce8001520523c7fbe9dcb3054173619fbaf1aa648d59b4576125b5703dcd575e22dba500bd51
-
SSDEEP
6144:aYqx+m2rmz45BWJZr+qPMbQ2XeyQBXqMZwhI1I5fWR26fGuA9Z5x:3qx+m2S4v8rfPIQ2dE1IAR299Z
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-22_fcd522ea627ddb3d9a49a2c8b938ef6a_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-22_fcd522ea627ddb3d9a49a2c8b938ef6a_mafia.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
Targets
-
-
Target
2024-11-22_fcd522ea627ddb3d9a49a2c8b938ef6a_mafia
-
Size
323KB
-
MD5
fcd522ea627ddb3d9a49a2c8b938ef6a
-
SHA1
a6a7186701bdd088c0a0aa0d879121bcdd9f60c0
-
SHA256
6f88f48ff68b6d6c6f66e6af25bd0bcf0071d9b224a696f0119a7469d9036e66
-
SHA512
c96dc8672fbc1e668f08c7ae0462151a9637aa34e83fb9f9e639ce8001520523c7fbe9dcb3054173619fbaf1aa648d59b4576125b5703dcd575e22dba500bd51
-
SSDEEP
6144:aYqx+m2rmz45BWJZr+qPMbQ2XeyQBXqMZwhI1I5fWR26fGuA9Z5x:3qx+m2S4v8rfPIQ2dE1IAR299Z
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Dharma family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (314) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
2Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1