General
-
Target
2024-11-27_1d146499e899a0cb0fee0bdb7dfb208a_makop
-
Size
49KB
-
Sample
241127-tjcxbazqgt
-
MD5
1d146499e899a0cb0fee0bdb7dfb208a
-
SHA1
b182b4454884f3f47a4e9ba4d63fde8c38d1b0a0
-
SHA256
fca54b93136fdfe32f124ea0b18bfc75bf53357e8bb5ba0226fc574f2678629c
-
SHA512
8c1a837b314ce1430c23290df034957742311b325b28427d443fb901d5d4fc4468d98adce8ff070aa68c55c6eec5c25f1a2ce2a39daa310a953670dc8be4890c
-
SSDEEP
768:laQRffGB31aCytHLykiKPT3JATD2qBwV2ckjbnsb0Ah99De0YADo3XmgZbVA0Y:laJ318HxZATvnsblYOobZ5Z
Behavioral task
behavioral1
Sample
2024-11-27_1d146499e899a0cb0fee0bdb7dfb208a_makop.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-27_1d146499e899a0cb0fee0bdb7dfb208a_makop.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\+README-WARNING+.txt
Targets
-
-
Target
2024-11-27_1d146499e899a0cb0fee0bdb7dfb208a_makop
-
Size
49KB
-
MD5
1d146499e899a0cb0fee0bdb7dfb208a
-
SHA1
b182b4454884f3f47a4e9ba4d63fde8c38d1b0a0
-
SHA256
fca54b93136fdfe32f124ea0b18bfc75bf53357e8bb5ba0226fc574f2678629c
-
SHA512
8c1a837b314ce1430c23290df034957742311b325b28427d443fb901d5d4fc4468d98adce8ff070aa68c55c6eec5c25f1a2ce2a39daa310a953670dc8be4890c
-
SSDEEP
768:laQRffGB31aCytHLykiKPT3JATD2qBwV2ckjbnsb0Ah99De0YADo3XmgZbVA0Y:laJ318HxZATvnsblYOobZ5Z
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (8314) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1