Resubmissions

08/04/2025, 19:22

250408-x3c8zayqx7 10

08/04/2025, 19:18

250408-xz9srsy1ct 10

08/04/2025, 19:14

250408-xx4hzaypz5 10

08/04/2025, 19:01

250408-xn9zdsyya1 10

08/04/2025, 18:53

250408-xj5twaymw5 10

General

  • Target

    http://google.com

  • Sample

    250408-xn9zdsyya1

Malware Config

Targets

    • Chimera

      Ransomware which infects local and network files, often distributed via Dropbox links.

    • Chimera Ransomware Loader DLL

      Drops/unpacks executable file which resembles Chimera's Loader.dll.

    • Chimera family

    • Renames multiple (3266) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v16

Tasks