Overview
overview
10Static
static
1055c30024ae...15.exe
windows7-x64
1055c30024ae...15.exe
windows7-x64
1055c30024ae...15.exe
windows10-2004-x64
1055c30024ae...15.exe
windows10-ltsc_2021-x64
1055c30024ae...15.exe
windows11-21h2-x64
1056f7b48f38...59.exe
windows10-2004-x64
1056f7b48f38...59.exe
windows7-x64
1056f7b48f38...59.exe
windows10-2004-x64
1056f7b48f38...59.exe
windows10-ltsc_2021-x64
1056f7b48f38...59.exe
windows11-21h2-x64
105a96b92938...a4.exe
windows11-21h2-x64
105a96b92938...a4.exe
windows7-x64
105a96b92938...a4.exe
windows10-2004-x64
105a96b92938...a4.exe
windows10-ltsc_2021-x64
105a96b92938...a4.exe
windows11-21h2-x64
10606b88fce1...c4.exe
windows10-2004-x64
3606b88fce1...c4.exe
windows7-x64
1606b88fce1...c4.exe
windows10-2004-x64
3606b88fce1...c4.exe
windows10-ltsc_2021-x64
3606b88fce1...c4.exe
windows11-21h2-x64
36bda9faf71...4b.exe
windows11-21h2-x64
106bda9faf71...4b.exe
windows7-x64
106bda9faf71...4b.exe
windows10-2004-x64
106bda9faf71...4b.exe
windows10-ltsc_2021-x64
106bda9faf71...4b.exe
windows11-21h2-x64
1071b46e95fb...a8.exe
windows11-21h2-x64
1071b46e95fb...a8.exe
windows7-x64
1071b46e95fb...a8.exe
windows10-2004-x64
1071b46e95fb...a8.exe
windows10-ltsc_2021-x64
1071b46e95fb...a8.exe
windows11-21h2-x64
10Resubmissions
25/03/2025, 13:12 UTC
250325-qfl42aznw9 1025/03/2025, 13:09 UTC
250325-qdtq4aznv6 1025/03/2025, 13:05 UTC
250325-qbtcjszns3 1025/03/2025, 13:01 UTC
250325-p9k86awxat 1025/03/2025, 12:55 UTC
250325-p58tnawwe1 1025/03/2025, 12:51 UTC
250325-p3txqazmt6 1005/02/2025, 11:16 UTC
250205-ndjvsavrdm 1016/07/2024, 08:54 UTC
240716-kt64gavakp 10General
-
Target
533.7z
-
Size
2.7MB
-
Sample
250325-p9k86awxat
-
MD5
7aded2388d27c5dc782dca435f160857
-
SHA1
744f53fe1f4c7a43a82e1a942eb71f4175da8935
-
SHA256
3730e9cba4a93bc985ef7cd2368ccbf5eccd4724f514b38b20e320e5553dd08d
-
SHA512
518957e9248e65c5231e10c3977d01f7d3b4aa43f08b00c668be8501a88e06d1eaa2a5aaf976ab9caa1d2eacbc7a2029731d5a7054df230aaf93a79294d9083b
-
SSDEEP
49152:BdRLSYLgm9h2iT/1Xd6STMtS07Cqjgfzj8flramouva2dd1ALRNyndSBSJQIQV:BdNtJPDJXd62MY50R+a5X1my8BSJQzV
Static task
static1
Behavioral task
behavioral1
Sample
55c30024aed833336eb4720a1a4a40c78496efb27b3c4d5c3f1d1b5935c12715.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
55c30024aed833336eb4720a1a4a40c78496efb27b3c4d5c3f1d1b5935c12715.exe
Resource
win7-20241010-en
Behavioral task
behavioral3
Sample
55c30024aed833336eb4720a1a4a40c78496efb27b3c4d5c3f1d1b5935c12715.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral4
Sample
55c30024aed833336eb4720a1a4a40c78496efb27b3c4d5c3f1d1b5935c12715.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral5
Sample
55c30024aed833336eb4720a1a4a40c78496efb27b3c4d5c3f1d1b5935c12715.exe
Resource
win11-20250313-en
Behavioral task
behavioral6
Sample
56f7b48f3877743c44aef0f3e990b3387dd6185f1c40a7477f5b6bad64960659.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
56f7b48f3877743c44aef0f3e990b3387dd6185f1c40a7477f5b6bad64960659.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
56f7b48f3877743c44aef0f3e990b3387dd6185f1c40a7477f5b6bad64960659.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
56f7b48f3877743c44aef0f3e990b3387dd6185f1c40a7477f5b6bad64960659.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral10
Sample
56f7b48f3877743c44aef0f3e990b3387dd6185f1c40a7477f5b6bad64960659.exe
Resource
win11-20250314-en
Behavioral task
behavioral11
Sample
5a96b929383817aa298eec8cca019bcd984fcd71dd8ee353541392c1082756a4.exe
Resource
win11-20250314-en
Behavioral task
behavioral12
Sample
5a96b929383817aa298eec8cca019bcd984fcd71dd8ee353541392c1082756a4.exe
Resource
win7-20241010-en
Behavioral task
behavioral13
Sample
5a96b929383817aa298eec8cca019bcd984fcd71dd8ee353541392c1082756a4.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral14
Sample
5a96b929383817aa298eec8cca019bcd984fcd71dd8ee353541392c1082756a4.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral15
Sample
5a96b929383817aa298eec8cca019bcd984fcd71dd8ee353541392c1082756a4.exe
Resource
win11-20250313-en
Behavioral task
behavioral16
Sample
606b88fce1441e6d83e1fb2ba1b511e4a9e68f7fc01c55b7c53e08fd28f9a0c4.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
606b88fce1441e6d83e1fb2ba1b511e4a9e68f7fc01c55b7c53e08fd28f9a0c4.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
606b88fce1441e6d83e1fb2ba1b511e4a9e68f7fc01c55b7c53e08fd28f9a0c4.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
606b88fce1441e6d83e1fb2ba1b511e4a9e68f7fc01c55b7c53e08fd28f9a0c4.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral20
Sample
606b88fce1441e6d83e1fb2ba1b511e4a9e68f7fc01c55b7c53e08fd28f9a0c4.exe
Resource
win11-20250314-en
Behavioral task
behavioral21
Sample
6bda9faf719bb7a55e822667d909086193d323d8fa06b1a3d62437fcf6a9e24b.exe
Resource
win11-20250313-en
Behavioral task
behavioral22
Sample
6bda9faf719bb7a55e822667d909086193d323d8fa06b1a3d62437fcf6a9e24b.exe
Resource
win7-20240903-en
Behavioral task
behavioral23
Sample
6bda9faf719bb7a55e822667d909086193d323d8fa06b1a3d62437fcf6a9e24b.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral24
Sample
6bda9faf719bb7a55e822667d909086193d323d8fa06b1a3d62437fcf6a9e24b.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral25
Sample
6bda9faf719bb7a55e822667d909086193d323d8fa06b1a3d62437fcf6a9e24b.exe
Resource
win11-20250313-en
Behavioral task
behavioral26
Sample
71b46e95fba31267475537a338f49ce1cd0bc56c0f15346b05b673051cbe90a8.exe
Resource
win11-20250313-en
Behavioral task
behavioral27
Sample
71b46e95fba31267475537a338f49ce1cd0bc56c0f15346b05b673051cbe90a8.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
71b46e95fba31267475537a338f49ce1cd0bc56c0f15346b05b673051cbe90a8.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
71b46e95fba31267475537a338f49ce1cd0bc56c0f15346b05b673051cbe90a8.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral30
Sample
71b46e95fba31267475537a338f49ce1cd0bc56c0f15346b05b673051cbe90a8.exe
Resource
win11-20250313-en
Malware Config
Extracted
blackmatter
1.2
512478c08dada2af19e49808fbda5b0b
- Username:
aheisler@hhcp.com - Password:
120Heisler
- Username:
dsmith@hhcp.com - Password:
Tesla2019
- Username:
administrator@hhcp.com - Password:
iteam8**
https://paymenthacks.com
http://paymenthacks.com
https://mojobiden.com
http://mojobiden.com
-
attempt_auth
true
-
create_mutex
true
-
encrypt_network_shares
true
-
exfiltrate
true
-
mount_volumes
true
Extracted
C:\info.hta
class='mark'>JohnTorrington1843@gmx.com</span></div>
class='mark'>RichardChancellor1554@tutanota.com</span></div>
http://www.w3.org/TR/html4/strict.dtd'>
Extracted
C:\Users\Admin\AppData\Local\Temp\scoped_dir452_1615450467\CRX_INSTALL\_locales\az\+README-WARNING+.txt
ardellchadwick275@msgsafe.io
Extracted
C:\info.hta
class='mark'>technobit@keemail.me</span></div>
class='mark'>technobits@yandex.com</span></div>
class='mark'>technobit@jabb.im</span>
http://www.w3.org/TR/html4/strict.dtd'>
https://pidgin.im/download/windows/</li>
Extracted
C:\info.hta
class='mark'>technobit@keemail.me</span></div>
class='mark'>technobits@yandex.com</span></div>
class='mark'>technobit@jabb.im</span>
http://www.w3.org/TR/html4/strict.dtd'>
https://pidgin.im/download/windows/</li>
Extracted
C:\info.hta
class='mark'>technobit@keemail.me</span></div>
class='mark'>technobits@yandex.com</span></div>
class='mark'>technobit@jabb.im</span>
http://www.w3.org/TR/html4/strict.dtd'>
https://pidgin.im/download/windows/</li>
Extracted
C:\Users\Admin\Desktop\info.hta
class='mark'>technobit@keemail.me</span></div>
class='mark'>technobits@yandex.com</span></div>
class='mark'>technobit@jabb.im</span>
http://www.w3.org/TR/html4/strict.dtd'>
https://pidgin.im/download/windows/</li>
Extracted
C:\info.hta
class='mark'>technobit@keemail.me</span></div>
class='mark'>technobits@yandex.com</span></div>
class='mark'>technobit@jabb.im</span>
http://www.w3.org/TR/html4/strict.dtd'>
https://pidgin.im/download/windows/</li>
Extracted
C:\info.hta
class='mark'>JohnTorrington1843@gmx.com</span></div>
class='mark'>RichardChancellor1554@tutanota.com</span></div>
http://www.w3.org/TR/html4/strict.dtd'>
Targets
-
-
Target
55c30024aed833336eb4720a1a4a40c78496efb27b3c4d5c3f1d1b5935c12715.exe
-
Size
56KB
-
MD5
4ab785bba778bd582b33baeac2cc9c22
-
SHA1
23db0ae4d5b7b4fe8698583e25e50e1b89cf9411
-
SHA256
55c30024aed833336eb4720a1a4a40c78496efb27b3c4d5c3f1d1b5935c12715
-
SHA512
916cc0d2e0e623a897d4d515e2148c0b08dd3c308b27b53032def045eafbd625ac2031fd5713e055f4f323a840ed534aaaa5da06586928cc2dbafb46cb276955
-
SSDEEP
1536:bNeRBl5PT/rx1mzwRMSTdLpJyCfPAIotcQ:bQRrmzwR5JyNO
-
Phobos family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Renames multiple (327) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
-
-
Target
56f7b48f3877743c44aef0f3e990b3387dd6185f1c40a7477f5b6bad64960659.exe
-
Size
42KB
-
MD5
abb04a0418be9cc4618f393d7fc9d76b
-
SHA1
dbe3b07ab1383e4d693bb6cab17ad8a7c1c5cd7b
-
SHA256
56f7b48f3877743c44aef0f3e990b3387dd6185f1c40a7477f5b6bad64960659
-
SHA512
f7bce71f01ffae675a8b8a23a8f2e4d162ccefc349beadb84ffcca890dc68ed636acf4f7d694145c779125078f6634f30aed5f5651ee6c12dc4768f7c0a0f47b
-
SSDEEP
768:QO1oR/8VS1RzK4wbs+D/SIJX+ZZ1SQQwZuIOPzDsHw67ZY23IWSjNV:QgS1FKnDtkuImsHw6V73ejNV
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (3413) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
-
-
Target
5a96b929383817aa298eec8cca019bcd984fcd71dd8ee353541392c1082756a4.exe
-
Size
57KB
-
MD5
a6092621b7db8dc1f2c1f93a9a7ced9f
-
SHA1
d4fd035605baa14375c9a59a93849b959df36bc4
-
SHA256
5a96b929383817aa298eec8cca019bcd984fcd71dd8ee353541392c1082756a4
-
SHA512
380318805a8fbed4b6e4a1270c697116de2b5a562bace4ab857e653dae5b319a5ace3a90c02f3235d6a95eec996a6632335c01df55136f051c13a01b82a5f4a4
-
SSDEEP
1536:RNeRBl5PT/rx1mzwRMSTdLpJOycgw04NxJ:RQRrmzwR5Jhcg74L
-
Phobos family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Renames multiple (790) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
-
-
Target
606b88fce1441e6d83e1fb2ba1b511e4a9e68f7fc01c55b7c53e08fd28f9a0c4.exe
-
Size
362KB
-
MD5
7c3f60037ac11106ab2994058cc553c9
-
SHA1
1a7c827670c46bdc90691605f974e7d7a0941fb1
-
SHA256
606b88fce1441e6d83e1fb2ba1b511e4a9e68f7fc01c55b7c53e08fd28f9a0c4
-
SHA512
c1e2e4bde4b1a4a739ba9408b90b4e088cd7a55f1b7595f99154a6aa0ce98ac0543f8f629aece802f21856301bac6e1b0c497eb8ea46fc0f5ba5c0afec04ae45
-
SSDEEP
6144:aNkgpZOuI7Am6xeTH2kxEiG68N/xc2iPpz1TumNf/qP+7WzQ9qsNlN:rgXOvIUTVmxUP7lqP+6zL2
Score3/10 -
-
-
Target
6bda9faf719bb7a55e822667d909086193d323d8fa06b1a3d62437fcf6a9e24b.exe
-
Size
71KB
-
MD5
8f033c07f57f8ce2e62e3a327f423d55
-
SHA1
57ac411652d7b1d9accaa8a1af5f4b6a45ef7448
-
SHA256
6bda9faf719bb7a55e822667d909086193d323d8fa06b1a3d62437fcf6a9e24b
-
SHA512
f3712e7d5d55b27a4c20de07cce136e6d58ce62fa146d29b34dece6248e4456139703c50df10cb318346311cfeee0a8449d49163e821744efcde3ecfe8b880df
-
SSDEEP
768:zncoLkaCbCq2l52DbnoPV0Yglwlu1y7e7th3BuItxn:QoLkaCb12l0DbCV6Wqyixn
-
Chaos Ransomware
-
Chaos family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
-
-
Target
71b46e95fba31267475537a338f49ce1cd0bc56c0f15346b05b673051cbe90a8.exe
-
Size
57KB
-
MD5
8f7bc58c754d6fb7bb0b31fe8a5821e3
-
SHA1
f2dccd378d7be5e6bddbf133a78369fdc800432b
-
SHA256
71b46e95fba31267475537a338f49ce1cd0bc56c0f15346b05b673051cbe90a8
-
SHA512
765be9549ed493432dc4945f1987982254b25308cc3b757ef1eca23b75517adc7ea4fe10f0aaafc35dd021bcba668d9f3a8e5a9e70ffc5e50ddfae3c014f28e3
-
SSDEEP
1536:vNeRBl5PT/rx1mzwRMSTdLpJ//OGCDmR+53H:vQRrmzwR5JLCKyX
-
Phobos family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Renames multiple (773) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Modifies Windows Firewall
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Direct Volume Access
1Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
3File Deletion
3Modify Registry
3Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Peripheral Device Discovery
2Query Registry
6Remote System Discovery
1System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1