General
-
Target
ba1be94550898eedb10eb73cb5383a2d1050e96ec4df8e0bf680d3e76a9e2429.bin
-
Size
418KB
-
Sample
250308-ryl3esymx3
-
MD5
05f1a39c0902297debceb4c9c4c6674c
-
SHA1
598b14b7f9fcb13421705e6bce5303e64f330492
-
SHA256
70afd8efb34382badead93ae104d958256de6be8054227ccc85fe95d5c5f9db0
-
SHA512
8ff125e223d462f347d5b12d27d72d2a86a417051e16268fcc43f946ae4c78759ac1604665cf8451ea35092e3e9d7a5ed421bb9586a5ca01eeb4b585be3eaa80
-
SSDEEP
12288:FnvxplpMAX99S4B009MqyQMKNT75tfAD8xE:FvxplpMAtU4Bl9MdQFT75tIoS
Static task
static1
Behavioral task
behavioral1
Sample
ba1be94550898eedb10eb73cb5383a2d1050e96ec4df8e0bf680d3e76a9e2429.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
C:\ProgramData\readme.txt
dragonforce
http://3pktcrcbmssvrnwe5skburdwe2h3v6ibdnn5kbjqihsg6eu6s6b7ryqd.onion
http://z3wqggtxft7id3ibr7srivv5gjof5fwg76slewnzwwakjuf3nlhukdid.onion
Targets
-
-
Target
ba1be94550898eedb10eb73cb5383a2d1050e96ec4df8e0bf680d3e76a9e2429.bin
-
Size
418KB
-
MD5
05f1a39c0902297debceb4c9c4c6674c
-
SHA1
598b14b7f9fcb13421705e6bce5303e64f330492
-
SHA256
70afd8efb34382badead93ae104d958256de6be8054227ccc85fe95d5c5f9db0
-
SHA512
8ff125e223d462f347d5b12d27d72d2a86a417051e16268fcc43f946ae4c78759ac1604665cf8451ea35092e3e9d7a5ed421bb9586a5ca01eeb4b585be3eaa80
-
SSDEEP
12288:FnvxplpMAX99S4B009MqyQMKNT75tfAD8xE:FvxplpMAtU4Bl9MdQFT75tIoS
-
DragonForce
Ransomware family based on Lockbit that was first observed in November 2023.
-
Dragonforce family
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1