General
-
Target
2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop
-
Size
41KB
-
Sample
250127-vzge4szmdk
-
MD5
2ca5161644f3e3c58b7f7832efd583c0
-
SHA1
5ce6370d62e04fb1db0431f78e385e374f2a9e3f
-
SHA256
b506600868e623e54f988caa04fd6d1973947b836e239c64bb8d1952dd76481a
-
SHA512
e9b6874c4a1958b1ed96b24d5cbba376a887a539dde464a37191cf14831220a39854054ce78954deab5b9dcd32198c404b9e9ff7e8cbb5c9db64a10ddc942a78
-
SSDEEP
768:jL+ntTLPgn3CI1uGukUcjI2Hp9xG6e7j6oERZVvrd7SRBl+Lkl+XkvDcYg17TIO8:jwtTLESI1RUcdJ861s0ccZ17TI1
Behavioral task
behavioral1
Sample
2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Admin\Desktop\readme-warning.txt
makop
Targets
-
-
Target
2025-01-27_2ca5161644f3e3c58b7f7832efd583c0_makop
-
Size
41KB
-
MD5
2ca5161644f3e3c58b7f7832efd583c0
-
SHA1
5ce6370d62e04fb1db0431f78e385e374f2a9e3f
-
SHA256
b506600868e623e54f988caa04fd6d1973947b836e239c64bb8d1952dd76481a
-
SHA512
e9b6874c4a1958b1ed96b24d5cbba376a887a539dde464a37191cf14831220a39854054ce78954deab5b9dcd32198c404b9e9ff7e8cbb5c9db64a10ddc942a78
-
SSDEEP
768:jL+ntTLPgn3CI1uGukUcjI2Hp9xG6e7j6oERZVvrd7SRBl+Lkl+XkvDcYg17TIO8:jwtTLESI1RUcdJ861s0ccZ17TI1
-
Makop family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (8304) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1