General
-
Target
Velocity Bootstrapper.exe
-
Size
358KB
-
Sample
250316-18f4lavlx3
-
MD5
1a887dd7df677a1c64c46ef238e7058b
-
SHA1
677b7dac16dd44a89cb72d17435861f75e5c07ca
-
SHA256
1b9c33152da1189582a6dd2b3c6a6e8f265999eef7f5dcef124a140957e6fb84
-
SHA512
2dffbfb2b29c3d3d3827f9a1f41db86a98dbbf9a95902123a430a5be498f36c985ad0d7a164f02acc9201422c76621817b8dc3d8579af8872ccdcf2e1be7255d
-
SSDEEP
3072:ZXBEq9jcQ15B8XJBwEa8//64HXoxSAdhtd+SHDtIaxyp2/pUY6HAnOb0O:7Eq9QQ15qJBwEa8/yEAxd+ah/xEoUoD
Behavioral task
behavioral1
Sample
Velocity Bootstrapper.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral2
Sample
Velocity Bootstrapper.exe
Resource
win11-20250314-en
Malware Config
Extracted
C:\ProgramData\Adobe\Setup\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\READ_ME.txt
Targets
-
-
Target
Velocity Bootstrapper.exe
-
Size
358KB
-
MD5
1a887dd7df677a1c64c46ef238e7058b
-
SHA1
677b7dac16dd44a89cb72d17435861f75e5c07ca
-
SHA256
1b9c33152da1189582a6dd2b3c6a6e8f265999eef7f5dcef124a140957e6fb84
-
SHA512
2dffbfb2b29c3d3d3827f9a1f41db86a98dbbf9a95902123a430a5be498f36c985ad0d7a164f02acc9201422c76621817b8dc3d8579af8872ccdcf2e1be7255d
-
SSDEEP
3072:ZXBEq9jcQ15B8XJBwEa8//64HXoxSAdhtd+SHDtIaxyp2/pUY6HAnOb0O:7Eq9QQ15qJBwEa8/yEAxd+ah/xEoUoD
-
Chaos Ransomware
-
Chaos family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1