General
-
Target
Bloody Kmax.exe
-
Size
7.4MB
-
Sample
250215-217r1szjcx
-
MD5
cde22b810942c0c6eef2e844a2fe8eae
-
SHA1
633ec7f9defbda8c7045f69e0a5ac1654068def6
-
SHA256
c773c6821f2962c2c89e482ead7edc03768a9c9835cdd264c3c2189f2c8dbd40
-
SHA512
e666fd809335888e4cf725e45f10fc7353dd3801a703f39353985b7ef35c6de1915abb22a54b4b1608fee86dd1c1c7b6c7b0b9d5215910164e1fb2469c32e58a
-
SSDEEP
24576:aaL3vVD8Lpq5u+B0cAUmhInhvctethPLqrzHBCBoNyUr4epjVGXWkY6V5vovNYiw:L9gvS3thO/EabZkY6LVm6fiMhZnLDUR
Behavioral task
behavioral1
Sample
Bloody Kmax.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Bloody Kmax.exe
Resource
win10v2004-20250211-en
Malware Config
Extracted
C:\Users\Admin\Documents\read_it.txt
chaos
Targets
-
-
Target
Bloody Kmax.exe
-
Size
7.4MB
-
MD5
cde22b810942c0c6eef2e844a2fe8eae
-
SHA1
633ec7f9defbda8c7045f69e0a5ac1654068def6
-
SHA256
c773c6821f2962c2c89e482ead7edc03768a9c9835cdd264c3c2189f2c8dbd40
-
SHA512
e666fd809335888e4cf725e45f10fc7353dd3801a703f39353985b7ef35c6de1915abb22a54b4b1608fee86dd1c1c7b6c7b0b9d5215910164e1fb2469c32e58a
-
SSDEEP
24576:aaL3vVD8Lpq5u+B0cAUmhInhvctethPLqrzHBCBoNyUr4epjVGXWkY6V5vovNYiw:L9gvS3thO/EabZkY6LVm6fiMhZnLDUR
-
Chaos Ransomware
-
Chaos family
-
Modifies boot configuration data using bcdedit
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1