General
-
Target
c844d02c91d5e6dc293de80085ad2f69b5c44bc46ec9fdaa4e3efbda062c871c(2).exe
-
Size
418KB
-
Sample
250204-vlxj6stjex
-
MD5
9db8f7378e2df01c842cfcb617e64475
-
SHA1
eada05f4bfd4876c57c24cd4b41f7a40ea97274c
-
SHA256
c844d02c91d5e6dc293de80085ad2f69b5c44bc46ec9fdaa4e3efbda062c871c
-
SHA512
692f2cadaf14bb1937d8758fe9191c053999d7bdeac0eec3f4388f13fcd2b063cbae05a2433f57f7bcaa68a23701176b36eab3f1b166b3649a47a3691c725ed2
-
SSDEEP
12288:FnvxplpMAX99S4B009MqyQMKNT7T2fAD8xE:FvxplpMAtU4Bl9MdQFT7T2IoS
Static task
static1
Behavioral task
behavioral1
Sample
c844d02c91d5e6dc293de80085ad2f69b5c44bc46ec9fdaa4e3efbda062c871c(2).exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
c844d02c91d5e6dc293de80085ad2f69b5c44bc46ec9fdaa4e3efbda062c871c(2).exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Program Files (x86)\readme.txt
dragonforce
http://3pktcrcbmssvrnwe5skburdwe2h3v6ibdnn5kbjqihsg6eu6s6b7ryqd.onion
http://z3wqggtxft7id3ibr7srivv5gjof5fwg76slewnzwwakjuf3nlhukdid.onion
Targets
-
-
Target
c844d02c91d5e6dc293de80085ad2f69b5c44bc46ec9fdaa4e3efbda062c871c(2).exe
-
Size
418KB
-
MD5
9db8f7378e2df01c842cfcb617e64475
-
SHA1
eada05f4bfd4876c57c24cd4b41f7a40ea97274c
-
SHA256
c844d02c91d5e6dc293de80085ad2f69b5c44bc46ec9fdaa4e3efbda062c871c
-
SHA512
692f2cadaf14bb1937d8758fe9191c053999d7bdeac0eec3f4388f13fcd2b063cbae05a2433f57f7bcaa68a23701176b36eab3f1b166b3649a47a3691c725ed2
-
SSDEEP
12288:FnvxplpMAX99S4B009MqyQMKNT7T2fAD8xE:FvxplpMAtU4Bl9MdQFT7T2IoS
-
DragonForce
Ransomware family based on Lockbit that was first observed in November 2023.
-
Dragonforce family
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Drops desktop.ini file(s)
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1