General
-
Target
Botox-0xb.zip
-
Size
54KB
-
Sample
250404-bwhzzsxwf1
-
MD5
1f4fb785b1dc67ce5eccd4a4ecabf6b9
-
SHA1
b0fffcaea262df466f55e0c83bfc6acde6284699
-
SHA256
bc0588d8d360f6e7fa386200d72b1857f913b36b2124d615acbfbc2851db630b
-
SHA512
7165c5620b67c6a2af7be7b18c5f257fd2d40595acabcd0264e738edd89ec8e4974e85a08cd93f2d38a63a44749a8db56164ae31e3b717d83f6385f9efc6c845
-
SSDEEP
1536:OTw7WEG4DV2oXHkrkFy+KWKv4GESt1iKr16fdu2:OTHE7BNHskQ+KJ4GPDrsfdu2
Static task
static1
Behavioral task
behavioral1
Sample
Botox-0xb.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
C:\Users\Admin\Desktop\case_id.txt
Targets
-
-
Target
Botox-0xb.exe
-
Size
170KB
-
MD5
8f0da65b1714819a26b959b6530cc576
-
SHA1
01145678908c0d379467e37f6679d248f1b7a3a4
-
SHA256
f2f15ed5568b4ea4c9ccf7f772347651c2aa13b266ddbbf3893795794214bb2f
-
SHA512
c4aa9db30de6cb03c2d24a8931e2ee2701aa634fdddd4d666e0b08e165ac9c190d28fb7fefbbbfa84ecda9bf2843fc15ca0a8387d15a4e18f85aa5cf45ad9dd3
-
SSDEEP
1536:4lX4Sg8k5hRaWsgB7VIzYn2YxBTpchbpMApZNoJj2010v0s0fqStAkGpV/ITZDdx:49tg5v5P7Vo010v0s0QRe3olYkbLdA
-
Renames multiple (2330) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1