General
-
Target
2024-12-18_160fd196cd73beb69c7ea9469e5bf70d_makop
-
Size
49KB
-
Sample
241218-ql79fszqfs
-
MD5
160fd196cd73beb69c7ea9469e5bf70d
-
SHA1
89a55d81b7e9f62005c42a88938af21c6727d69b
-
SHA256
1c27d9211f4436203abfa5c949e19f118e0ab3318026376213ba2b25209b1acd
-
SHA512
cb22e624d7ebada9f8e751e2034e0ffbb758099f1395b1527879e8b775729bc05090d572a5d86595c6456bb10b3250e01a352a279c32a5e08ed4ba3444c7637a
-
SSDEEP
768:SaQRff/B31aCytHLykiKPT3JATD2qBwV2ckjbnsb0Ah99De0YADOIiL6W2tP24nj:Saq318HxZATvnsblYOhisX
Behavioral task
behavioral1
Sample
2024-12-18_160fd196cd73beb69c7ea9469e5bf70d_makop.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-12-18_160fd196cd73beb69c7ea9469e5bf70d_makop.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\+README-WARNING+.txt
Targets
-
-
Target
2024-12-18_160fd196cd73beb69c7ea9469e5bf70d_makop
-
Size
49KB
-
MD5
160fd196cd73beb69c7ea9469e5bf70d
-
SHA1
89a55d81b7e9f62005c42a88938af21c6727d69b
-
SHA256
1c27d9211f4436203abfa5c949e19f118e0ab3318026376213ba2b25209b1acd
-
SHA512
cb22e624d7ebada9f8e751e2034e0ffbb758099f1395b1527879e8b775729bc05090d572a5d86595c6456bb10b3250e01a352a279c32a5e08ed4ba3444c7637a
-
SSDEEP
768:SaQRff/B31aCytHLykiKPT3JATD2qBwV2ckjbnsb0Ah99De0YADOIiL6W2tP24nj:Saq318HxZATvnsblYOhisX
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (8313) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1