General
-
Target
2025-01-23_09e4145752538b2ec9fe7f7cd815c3f6_makop
-
Size
47KB
-
Sample
250123-j9dw7asnbp
-
MD5
09e4145752538b2ec9fe7f7cd815c3f6
-
SHA1
b487a26d5b90134b24ca9f3712458aeec3c4f503
-
SHA256
71bb84184879546b873b4c50c248d845983441ad0cd96529be6738f1d08e8271
-
SHA512
ef982d17ee8816f886762c0e6a9fbb8a75b1159439b44fc4de41ced738d0700944e7a656114a34ca4369ed2301ad746c144edee7421181933ffae1b457cf6f73
-
SSDEEP
768:TVOlQ16a1hs+meAxmQj3292Q62+cCfy6sXtPxGkZxZRlfIi34IkwNrFdSGjjxkm/:ToQ16IsJHmQjo62+cV9t9xZR553bNFd2
Behavioral task
behavioral1
Sample
2025-01-23_09e4145752538b2ec9fe7f7cd815c3f6_makop.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-23_09e4145752538b2ec9fe7f7cd815c3f6_makop.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\readme-warning.txt
makop
Targets
-
-
Target
2025-01-23_09e4145752538b2ec9fe7f7cd815c3f6_makop
-
Size
47KB
-
MD5
09e4145752538b2ec9fe7f7cd815c3f6
-
SHA1
b487a26d5b90134b24ca9f3712458aeec3c4f503
-
SHA256
71bb84184879546b873b4c50c248d845983441ad0cd96529be6738f1d08e8271
-
SHA512
ef982d17ee8816f886762c0e6a9fbb8a75b1159439b44fc4de41ced738d0700944e7a656114a34ca4369ed2301ad746c144edee7421181933ffae1b457cf6f73
-
SSDEEP
768:TVOlQ16a1hs+meAxmQj3292Q62+cCfy6sXtPxGkZxZRlfIi34IkwNrFdSGjjxkm/:ToQ16IsJHmQjo62+cV9t9xZR553bNFd2
-
Makop family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (8337) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Stops running service(s)
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1System Services
1Service Execution
1Windows Management Instrumentation
1Defense Evasion
Direct Volume Access
1Impair Defenses
1Indicator Removal
3File Deletion
3Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1