General
-
Target
mkp_nowin.exe.bin
-
Size
42KB
-
Sample
250106-rmmjta1kel
-
MD5
cdbb7bcd08304960a69e8971739ad37c
-
SHA1
5a1d4f07d7f77c29ea8eefecaed47631f11056ad
-
SHA256
95415408359fb7dcd0883f67e745a8e10ceb834eff6c4c55aeb4a907a05a1e9b
-
SHA512
015729cbfbf425193a512055db187a08bbec1c3e486c56fc8dd3cfa8c771d9f632c7fa6cd6fb42da6a631f7c9636e6c966592efcd35d8951e45fee06bd6a8881
-
SSDEEP
768:bO1oR/7VS1RzK4wbs+D/SIJX+ZZ1SQQwZuIOPzDWCv8z+dgpSvU6:bpS1FKnDtkuImxYpSM6
Behavioral task
behavioral1
Sample
mkp_nowin.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
mkp_nowin.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\+README-WARNING+.txt
https://tox.chat
Targets
-
-
Target
mkp_nowin.exe.bin
-
Size
42KB
-
MD5
cdbb7bcd08304960a69e8971739ad37c
-
SHA1
5a1d4f07d7f77c29ea8eefecaed47631f11056ad
-
SHA256
95415408359fb7dcd0883f67e745a8e10ceb834eff6c4c55aeb4a907a05a1e9b
-
SHA512
015729cbfbf425193a512055db187a08bbec1c3e486c56fc8dd3cfa8c771d9f632c7fa6cd6fb42da6a631f7c9636e6c966592efcd35d8951e45fee06bd6a8881
-
SSDEEP
768:bO1oR/7VS1RzK4wbs+D/SIJX+ZZ1SQQwZuIOPzDWCv8z+dgpSvU6:bpS1FKnDtkuImxYpSM6
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (8343) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Peripheral Device Discovery
1Query Registry
4Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1