Resubmissions

30/01/2025, 03:04 UTC

250130-dkkesawjdk 10

30/01/2025, 01:27 UTC

250130-bvjj5atmbk 10

30/01/2025, 01:11 UTC

250130-bj2assvkbw 10

General

  • Target

    chat.exe

  • Size

    27KB

  • Sample

    250130-bvjj5atmbk

  • MD5

    bb45c811961c699e90d80cc770fd828b

  • SHA1

    bab510ce8e9413bfcb907964e7f29c6f0af740ac

  • SHA256

    e5c6c05c353d24bb71d61de48ec945c4284df2ac6aabd751405b7f9349973bab

  • SHA512

    2f5c64b96ad289d38b498d949c2d7d89006d4c19a61efd53fdda48342817febdd1b1ffdf6f53d99296101d88a3d669bc9d3fef5017eb4254c759148eb410cd6b

  • SSDEEP

    384:+tWZPzzxAm1vS5ZooqGhvLKe2cIS2NirglyOy5o91XOkHpg82vO:j7zxAmOS/Gee2VSSifho9pOkHq822

Malware Config

Extracted

Path

C:\ProgramData\Adobe\Updater6\read_it.txt

Ransom Note
Don't worry, you can return all your files! All your files like documents, photos, databases and other important are encrypted What guarantees do we give to you? You can send 3 of your encrypted files and we decrypt it for free. You must follow these steps To decrypt your files : 1) Write on our e-mail :test@test.com ( In case of no answer in 24 hours check your spam folder or write us to this e-mail: test2@test.com) 2) Obtain Bitcoin (You have to pay for decryption in Bitcoins. After payment we will send you the tool that will decrypt all your files.)
Emails

test@test.com

test2@test.com

Targets

    • Target

      chat.exe

    • Size

      27KB

    • MD5

      bb45c811961c699e90d80cc770fd828b

    • SHA1

      bab510ce8e9413bfcb907964e7f29c6f0af740ac

    • SHA256

      e5c6c05c353d24bb71d61de48ec945c4284df2ac6aabd751405b7f9349973bab

    • SHA512

      2f5c64b96ad289d38b498d949c2d7d89006d4c19a61efd53fdda48342817febdd1b1ffdf6f53d99296101d88a3d669bc9d3fef5017eb4254c759148eb410cd6b

    • SSDEEP

      384:+tWZPzzxAm1vS5ZooqGhvLKe2cIS2NirglyOy5o91XOkHpg82vO:j7zxAmOS/Gee2VSSifho9pOkHq822

    • Chaos

      Ransomware family first seen in June 2021.

    • Chaos Ransomware

    • Chaos family

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies boot configuration data using bcdedit

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Deletes backup catalog

      Uses wbadmin.exe to inhibit system recovery.

    • Disables Task Manager via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.