General
-
Target
2025-01-06_cdbb7bcd08304960a69e8971739ad37c_makop
-
Size
42KB
-
Sample
250106-lb6knavpgq
-
MD5
cdbb7bcd08304960a69e8971739ad37c
-
SHA1
5a1d4f07d7f77c29ea8eefecaed47631f11056ad
-
SHA256
95415408359fb7dcd0883f67e745a8e10ceb834eff6c4c55aeb4a907a05a1e9b
-
SHA512
015729cbfbf425193a512055db187a08bbec1c3e486c56fc8dd3cfa8c771d9f632c7fa6cd6fb42da6a631f7c9636e6c966592efcd35d8951e45fee06bd6a8881
-
SSDEEP
768:bO1oR/7VS1RzK4wbs+D/SIJX+ZZ1SQQwZuIOPzDWCv8z+dgpSvU6:bpS1FKnDtkuImxYpSM6
Behavioral task
behavioral1
Sample
2025-01-06_cdbb7bcd08304960a69e8971739ad37c_makop.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-06_cdbb7bcd08304960a69e8971739ad37c_makop.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\+README-WARNING+.txt
https://tox.chat
Targets
-
-
Target
2025-01-06_cdbb7bcd08304960a69e8971739ad37c_makop
-
Size
42KB
-
MD5
cdbb7bcd08304960a69e8971739ad37c
-
SHA1
5a1d4f07d7f77c29ea8eefecaed47631f11056ad
-
SHA256
95415408359fb7dcd0883f67e745a8e10ceb834eff6c4c55aeb4a907a05a1e9b
-
SHA512
015729cbfbf425193a512055db187a08bbec1c3e486c56fc8dd3cfa8c771d9f632c7fa6cd6fb42da6a631f7c9636e6c966592efcd35d8951e45fee06bd6a8881
-
SSDEEP
768:bO1oR/7VS1RzK4wbs+D/SIJX+ZZ1SQQwZuIOPzDWCv8z+dgpSvU6:bpS1FKnDtkuImxYpSM6
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (8369) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1