General

  • Target

    malwareransomware.exe

  • Size

    23KB

  • Sample

    250210-afkcfawpfj

  • MD5

    47750b58657debaa542dc362b2b475d2

  • SHA1

    4a69be06f72fc4cfab62914ef3f5ee7a6ad98500

  • SHA256

    8ccace3ee82c7a575a2256a35a74e52981d34a92f979fac94cc5e8406260e9f5

  • SHA512

    078b5716bb55171ba8af69246caca0951e8c2193611516210b703d6fd5500aef35c5a02f8e059704102ac903fddad2e9de08014174856bc418a6f375856af0de

  • SSDEEP

    384:h3Mg/bqo2Yag2bu01Skp7DPJIXrTyKJ0r91Cibb5SeZ:Dqo2BHuOVp7DPJcyu0r9pbb4eZ

Malware Config

Extracted

Path

C:\Users\Admin\Documents\read_it.txt

Family

chaos

Ransom Note
----> Chaos is multi language ransomware. Translate your note to any language <---- All of your files have been encrypted! Your computer was infected with a ransomware called nigger ransomware. Your files have been encrypted and fucked. pay $1,500. Payment can be made in Bitcoin only. How do I pay, where do I get Bitcoin? Purchasing Bitcoin varies from country to country, you are best advised to do a quick google search yourself to find out how to buy Bitcoin. Many of our customers have reported these sites to be fast and reliable: Coinmama - hxxps://www.coinmama.com Bitpanda - hxxps://www.bitpanda.com Payment informationAmount: 0.1473766 BTC Bitcoin Address: bc1qlnzcep4l4ac0ttdrq7awxev9ehu465f2vpt9x0

Targets

    • Target

      malwareransomware.exe

    • Size

      23KB

    • MD5

      47750b58657debaa542dc362b2b475d2

    • SHA1

      4a69be06f72fc4cfab62914ef3f5ee7a6ad98500

    • SHA256

      8ccace3ee82c7a575a2256a35a74e52981d34a92f979fac94cc5e8406260e9f5

    • SHA512

      078b5716bb55171ba8af69246caca0951e8c2193611516210b703d6fd5500aef35c5a02f8e059704102ac903fddad2e9de08014174856bc418a6f375856af0de

    • SSDEEP

      384:h3Mg/bqo2Yag2bu01Skp7DPJIXrTyKJ0r91Cibb5SeZ:Dqo2BHuOVp7DPJcyu0r9pbb4eZ

    • Chaos

      Ransomware family first seen in June 2021.

    • Chaos Ransomware

    • Chaos family

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies boot configuration data using bcdedit

    • Deletes backup catalog

      Uses wbadmin.exe to inhibit system recovery.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks