General
-
Target
2025-04-11_bea663ba7b6ed934d7e41950010d6c22_elex_makop
-
Size
42KB
-
Sample
250411-r7gt3asvaw
-
MD5
bea663ba7b6ed934d7e41950010d6c22
-
SHA1
e01fc5f2dd09784e194fe336334c5b54b76fadbc
-
SHA256
1418f96bb8de8270e496c2676c5c567ceba03d195f198770352107c73c19fb01
-
SHA512
b9a5093a1b1078e51176ef31bf88034f0fa0be5f3a97dcb3c59b64e8939b15498adc0f228c68ba084fc6506eabe4c16491e7dacd177ef502909b5f08a61df8b6
-
SSDEEP
768:ono/YW1wUFGKQI1LSi/TqBKjBg1PuCu7bxGW60596iwL1gw6+fTmIHZDS6/0gTHd:onzW1w1TI1rTEKjBgU9h596I+fTDBSz1
Behavioral task
behavioral1
Sample
2025-04-11_bea663ba7b6ed934d7e41950010d6c22_elex_makop.exe
Resource
win10v2004-20250410-en
Malware Config
Extracted
C:\Program Files\7-Zip\readme-warning.txt
https://icq.com/windows/
https://icq.im/Lookfornewitguy
Targets
-
-
Target
2025-04-11_bea663ba7b6ed934d7e41950010d6c22_elex_makop
-
Size
42KB
-
MD5
bea663ba7b6ed934d7e41950010d6c22
-
SHA1
e01fc5f2dd09784e194fe336334c5b54b76fadbc
-
SHA256
1418f96bb8de8270e496c2676c5c567ceba03d195f198770352107c73c19fb01
-
SHA512
b9a5093a1b1078e51176ef31bf88034f0fa0be5f3a97dcb3c59b64e8939b15498adc0f228c68ba084fc6506eabe4c16491e7dacd177ef502909b5f08a61df8b6
-
SSDEEP
768:ono/YW1wUFGKQI1LSi/TqBKjBg1PuCu7bxGW60596iwL1gw6+fTmIHZDS6/0gTHd:onzW1w1TI1rTEKjBgU9h596I+fTDBSz1
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (9349) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v16
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1