General
-
Target
Void_antikick_and_antibanned.rar
-
Size
361KB
-
Sample
241227-c1ptrszmcz
-
MD5
157111f87cf7ffd6472484a8e919325f
-
SHA1
b0b4125f4cfaa5a66f9dc9a4879750d677a6b7c8
-
SHA256
dd4694bfe86880e9cdc215804b0a61ff320664702660adf91eb1986d44c3e76c
-
SHA512
b116af6aa5ca5e6b138632b3c11da77e1f57ae87c641bdf6d206029aacdfb5a3611fd59e7871d831b4745614d86da18f61d8c4b14264f88f160706e990944e14
-
SSDEEP
6144:Zld0SQjGkxCGyt2fnludJm+vpe/Bd5pHZlZrrI25BH1lDh8rsxF5ioxbQ:ZTQakxCR+nfm0/75LfV1ll8rsxFcoRQ
Static task
static1
Behavioral task
behavioral1
Sample
Void A-B.dll
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
Void V-B.exe
Resource
win11-20241023-en
Behavioral task
behavioral3
Sample
WinDivert.dll
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
WinDivert64.sys
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
Void A-B.dll
-
Size
15KB
-
MD5
1b1284100327d972e017f565dbecf80e
-
SHA1
5b4f0c122a80478973eb6f9cb3bbcaf186295aea
-
SHA256
9444a6e6b66f13f666f9c60d1935824f61c7256e35a8cf0440e29baa7fbe42c7
-
SHA512
4ccb9e233a3573f6eded0efa8fa54ed929818394cdf2153623d902c749d37751da6f489354aa50968e53d42d5ce339f6368dedb7858a4ff43a1927b4338954a4
-
SSDEEP
384:EHGiP0PYf9pHuGvATXlQRNq/EbUKxcneWuDlE:E9MQf90GvQXlQvAEcehD
Score1/10 -
-
-
Target
Void V-B.exe
-
Size
1.1MB
-
MD5
1043dd9ad98e1d290bb38597da832236
-
SHA1
d4ed17f479ed0675ff1dc1a35072a76ece4963e3
-
SHA256
4c1adfe7948b25780e81ea03175989e9c890e863691a22644785beab86399246
-
SHA512
dfb2f085261dba405f2f780fd55e8952b4bd0c134da9563ef3a6b96f65c6d9714078c8ef8aedfdde2d5a30f986776ab46f4749bd75539f17a7b49bae2bd32050
-
SSDEEP
24576:WdQOhDsVixFXYnS6mjHSgRqH9RcEhqsUst:WJYViIS6mjJR0cE0sUst
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Dharma family
-
Modifies WinLogon for persistence
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (552) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Disables use of System Restore points
-
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection
-
Modifies Windows Firewall
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Impair Defenses: Safe Mode Boot
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
-
-
Target
WinDivert.dll
-
Size
15KB
-
MD5
1b1284100327d972e017f565dbecf80e
-
SHA1
5b4f0c122a80478973eb6f9cb3bbcaf186295aea
-
SHA256
9444a6e6b66f13f666f9c60d1935824f61c7256e35a8cf0440e29baa7fbe42c7
-
SHA512
4ccb9e233a3573f6eded0efa8fa54ed929818394cdf2153623d902c749d37751da6f489354aa50968e53d42d5ce339f6368dedb7858a4ff43a1927b4338954a4
-
SSDEEP
384:EHGiP0PYf9pHuGvATXlQRNq/EbUKxcneWuDlE:E9MQf90GvQXlQvAEcehD
Score1/10 -
-
-
Target
WinDivert64.sys
-
Size
37KB
-
MD5
3bd5ac2e9d96e680f5dbdd183a58c47d
-
SHA1
83b08cb5e61c7b37bd710ea01196a26fc8f38610
-
SHA256
208c092fe77f161c5a313b916d73fa7f6d10dd289bab8bb5dfb3d59aacb27f25
-
SHA512
6cccd7971f423f72f5dbd01a83a2d27bb2bde63c4d1f5e127d77cfa0df85c289a2c3cd95c110ce38b58b9ea9a49aad18ae50f352ac6b21740d0294f771fbcb78
-
SSDEEP
768:R5VorUqgJs3/KtdrbYiZdNSRUYjbMUYOUaCdHUZ9fdCrYc:vVorUn9cRUuILLd07fdCU
Score1/10 -
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
2Safe Mode Boot
1Indicator Removal
2File Deletion
2Modify Registry
5Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1