Resubmissions

19-02-2025 03:41

250219-d8y8vawnam 10

General

  • Target

    250218-vrw6lavjbq_pw_infected.zip

  • Size

    25KB

  • Sample

    250221-e4yxysvns2

  • MD5

    1ff4b8d111332d6819989d6ebab7bd9e

  • SHA1

    9e5e6af9911ce01fe3bdda8ffd8c1f46183ae364

  • SHA256

    9185a41647a1d171c8a14b8be04bfafa6bba600aedc4bddd8a6a66dcc1d38d80

  • SHA512

    922cb608ddd500dc195925376d1103ba73ab8ae8a4812c45934f843a3260708a2c80f8beac59cd68ffed7c35202750f73c3ba2cdf6942c0e2450d71ff13671da

  • SSDEEP

    384:9ml0tSc21DWjIhZ2dWN9qQxMT1Fzzi9ZNEj8p4tunReXeyw7BLirtfux:AlUShDl2U9qQ4zi9Z4Q4xZeLat0

Malware Config

Targets

    • Target

      YashmaClients.exe

    • Size

      129KB

    • MD5

      15fba1967c6bcd09520811dfe34a159b

    • SHA1

      dec383511b8f764f3222798586ee22f0fda0331c

    • SHA256

      a83e19610aa006d4789bb38e18b609538befb16a1df30e1205e0c38aeda089e4

    • SHA512

      f2990e7c548f0bb18e84aeff62a38ce5d97046b44313dfda948d51efe4eac7c855b71437b57cb2e9f48453a27570559c3d6ab8349be1fdbaac44b2ef79f9dc59

    • SSDEEP

      768:x7zxAmU2NJ1KQxJPho9aT3e82hQfMCwRhOF15utoS:xND3x7Pq9m3ZsA/wCFLS

    • Chaos

      Ransomware family first seen in June 2021.

    • Chaos Ransomware

    • Chaos family

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies boot configuration data using bcdedit

    • Deletes backup catalog

      Uses wbadmin.exe to inhibit system recovery.

    • Disables Task Manager via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks