General
-
Target
Dragonforce.zip
-
Size
94KB
-
Sample
250406-vmarsstybt
-
MD5
7e7b8b35317b1bbf57cd5b39c310da4c
-
SHA1
3966077d545454f8054be4dbdfce646a740b911f
-
SHA256
8656c8bc2d098776803ef6648d5b4d9e4cc444647ac09bb97fcccd54956ddc94
-
SHA512
3288d141c1a25acc3af3e3b38ef67e2d61db55c85ddc7adebed3d41eb30603ea0b5a3d10bed75b491b9c37b94ee3168dd6b95c843c06e392c559144bee9a74b2
-
SSDEEP
1536:+LK9RGjrGYNgNHOagSR/twp48BGn7L/I1RpeavTkH88m/Y+YEROahglRPN7QXN60:LGHTgNugtwG8YnYjpXTN8m/Y+gqWRl8F
Behavioral task
behavioral1
Sample
Dragonforce.zip
Resource
win11-20250313-en
Behavioral task
behavioral2
Sample
1250ba6f25fd60077f698a2617c15f89d58c1867339bfd9ee8ab19ce9943304b.exe
Resource
win11-20250313-en
Behavioral task
behavioral3
Sample
__MACOSX/._1250ba6f25fd60077f698a2617c15f89d58c1867339bfd9ee8ab19ce9943304b.exe
Resource
win11-20250313-en
Malware Config
Extracted
C:\AoVOpni2N.README.txt
dragonforce
http://3pktcrcbmssvrnwe5skburdwe2h3v6ibdnn5kbjqihsg6eu6s6b7ryqd.onion
http://z3wqggtxft7id3ibr7srivv5gjof5fwg76slewnzwwakjuf3nlhukdid.onion
Targets
-
-
Target
Dragonforce.zip
-
Size
94KB
-
MD5
7e7b8b35317b1bbf57cd5b39c310da4c
-
SHA1
3966077d545454f8054be4dbdfce646a740b911f
-
SHA256
8656c8bc2d098776803ef6648d5b4d9e4cc444647ac09bb97fcccd54956ddc94
-
SHA512
3288d141c1a25acc3af3e3b38ef67e2d61db55c85ddc7adebed3d41eb30603ea0b5a3d10bed75b491b9c37b94ee3168dd6b95c843c06e392c559144bee9a74b2
-
SSDEEP
1536:+LK9RGjrGYNgNHOagSR/twp48BGn7L/I1RpeavTkH88m/Y+YEROahglRPN7QXN60:LGHTgNugtwG8YnYjpXTN8m/Y+gqWRl8F
Score1/10 -
-
-
Target
1250ba6f25fd60077f698a2617c15f89d58c1867339bfd9ee8ab19ce9943304b.exe
-
Size
147KB
-
MD5
d54bae930b038950c2947f5397c13f84
-
SHA1
e164bbaf848fa5d46fa42f62402a1c55330ef562
-
SHA256
1250ba6f25fd60077f698a2617c15f89d58c1867339bfd9ee8ab19ce9943304b
-
SHA512
81001ae98c5670aaf6c33d5f2ecae1ed20058fa5b1824f0c48fc12d93c5bf7c9cc1ac502e85c9244bdd13682539ff9f343907f2e965e04f910df8144f60fd63d
-
SSDEEP
3072:e6glyuxE4GsUPnliByocWep6v6JMdoKkgwfHweVg2sp+:e6gDBGpvEByocWe+oKT+g2a+
-
DragonForce
Ransomware family based on Lockbit that was first observed in November 2023.
-
Dragonforce family
-
Downloads MZ/PE file
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks whether UAC is enabled
-
Drops desktop.ini file(s)
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
__MACOSX/._1250ba6f25fd60077f698a2617c15f89d58c1867339bfd9ee8ab19ce9943304b.exe
-
Size
276B
-
MD5
5c2f09e0062d7912bcb30c62dcf17d7b
-
SHA1
2c5208dfd913e48c8d79ff310711b67a4c5eb944
-
SHA256
d13f88e34917cdcf19489cd3eccf29bcdbc1ca85c4f95fcad80065c8ed09c70b
-
SHA512
fb1aea1e90d782136d9a7d31de69b61de086314c9af42ae9ca4ed4211566db25343fae313c42726a5232395c906041b668e4798f29f9b8e8153f89cf637b8a3d
Score1/10 -
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Indicator Removal
1File Deletion
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1