General

  • Target

    cr4cked vixen.exe

  • Size

    27KB

  • Sample

    250216-d4q2nsznak

  • MD5

    f3412def470db187f3a9b95ede250e73

  • SHA1

    65be90a1ad51bec8140cec84b49ea576f68696ee

  • SHA256

    8036cb4832edad45d44412716e288f9e354c30e88ea79958f66c1cd3c6e3cad4

  • SHA512

    640ae4dc939696cedeef764284fb1c86391c704d6ab65a6c48af1f4c0f63945ef38b41a3503d0075476aa1b4ba62bc71a73a4f91ece249a9b7432731997ce31f

  • SSDEEP

    384:4tWZPzzxAm1v85nIruz10CSGGCS6PNsnlyAOy5o91YVoL+82voP:N7zxAmAIruz10CGLkNiho9z682M

Malware Config

Targets

    • Target

      cr4cked vixen.exe

    • Size

      27KB

    • MD5

      f3412def470db187f3a9b95ede250e73

    • SHA1

      65be90a1ad51bec8140cec84b49ea576f68696ee

    • SHA256

      8036cb4832edad45d44412716e288f9e354c30e88ea79958f66c1cd3c6e3cad4

    • SHA512

      640ae4dc939696cedeef764284fb1c86391c704d6ab65a6c48af1f4c0f63945ef38b41a3503d0075476aa1b4ba62bc71a73a4f91ece249a9b7432731997ce31f

    • SSDEEP

      384:4tWZPzzxAm1v85nIruz10CSGGCS6PNsnlyAOy5o91YVoL+82voP:N7zxAmAIruz10CGLkNiho9z682M

    • Chaos

      Ransomware family first seen in June 2021.

    • Chaos Ransomware

    • Chaos family

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies boot configuration data using bcdedit

    • Deletes backup catalog

      Uses wbadmin.exe to inhibit system recovery.

    • Disables Task Manager via registry modification

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks