General
-
Target
ba1be94550898eedb10eb73cb5383a2d1050e96ec4df8e0bf680d3e76a9e2429.exe
-
Size
418KB
-
Sample
250217-s8783szphx
-
MD5
d44071f255785c73909d64f824331ebf
-
SHA1
577b110a8bfa6526b21bb728e14bd6494dc67f71
-
SHA256
ba1be94550898eedb10eb73cb5383a2d1050e96ec4df8e0bf680d3e76a9e2429
-
SHA512
e15e61a88c1d93ab46f45c914957d266d12418611ba00f3e070c2f98bc2bd7d4ece112bf622ea1ec7c7505c002de6575a218f5d2ff5c69db34e93f1a22d5d7bc
-
SSDEEP
12288:FnvxplpMAX99S4B009MqyQMKNT75tfAD8xE:FvxplpMAtU4Bl9MdQFT75tIoS
Static task
static1
Behavioral task
behavioral1
Sample
ba1be94550898eedb10eb73cb5383a2d1050e96ec4df8e0bf680d3e76a9e2429.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ba1be94550898eedb10eb73cb5383a2d1050e96ec4df8e0bf680d3e76a9e2429.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
C:\Program Files (x86)\readme.txt
dragonforce
http://3pktcrcbmssvrnwe5skburdwe2h3v6ibdnn5kbjqihsg6eu6s6b7ryqd.onion
http://z3wqggtxft7id3ibr7srivv5gjof5fwg76slewnzwwakjuf3nlhukdid.onion
Targets
-
-
Target
ba1be94550898eedb10eb73cb5383a2d1050e96ec4df8e0bf680d3e76a9e2429.exe
-
Size
418KB
-
MD5
d44071f255785c73909d64f824331ebf
-
SHA1
577b110a8bfa6526b21bb728e14bd6494dc67f71
-
SHA256
ba1be94550898eedb10eb73cb5383a2d1050e96ec4df8e0bf680d3e76a9e2429
-
SHA512
e15e61a88c1d93ab46f45c914957d266d12418611ba00f3e070c2f98bc2bd7d4ece112bf622ea1ec7c7505c002de6575a218f5d2ff5c69db34e93f1a22d5d7bc
-
SSDEEP
12288:FnvxplpMAX99S4B009MqyQMKNT75tfAD8xE:FvxplpMAtU4Bl9MdQFT75tIoS
-
DragonForce
Ransomware family based on Lockbit that was first observed in November 2023.
-
Dragonforce family
-
Downloads MZ/PE file
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Drops desktop.ini file(s)
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1