MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4b922409207ad4662325f16ba79bb9ff2a7f408deee9ea6a99c5a267c4cec602. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Chaos


Vendor detections: 13


Intelligence 13 IOCs YARA File information Comments

SHA256 hash: 4b922409207ad4662325f16ba79bb9ff2a7f408deee9ea6a99c5a267c4cec602
SHA3-384 hash: b08d3fc1390dbf9e3f5f0d3d68211e0bc4eae97310b5bd312599ca0d3c2e5813c89003dcbf3d6f924a0811d015953199
SHA1 hash: 240b8e460be45891cd2529620b13afd230c5bc47
MD5 hash: 916ca2273debc1743307562e9b16aabd
humanhash: burger-undress-carbon-grey
File name:ProtonVPN_win_v2.2.0.bin
Download: download sample
Signature Chaos
File size:1'710'240 bytes
First seen:2022-11-10 05:06:35 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash d5d9d937853db8b666bd4b525813d7bd (40 x DCRat, 28 x njrat, 5 x RedLineStealer)
ssdeep 49152:9Kwn0jI2r9P+UBXPDoJjZY8VkvitEv8Ubv:9Kwn0jI2pj8PVtEv
Threatray 3'213 similar samples on MalwareBazaar
TLSH T1BB85128AF07087E5E86B4C318B7764D502727C2EE9F99C1C718A321649B365F183B66F
TrID 84.7% (.EXE) Win32 Executable MS Visual C++ 4.x (134693/65)
4.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.1% (.EXE) Win16 NE executable (generic) (5038/12/1)
2.8% (.EXE) Win32 Executable (generic) (4505/5/1)
1.3% (.EXE) Win16/32 Executable Delphi generic (2072/23)
File icon (PE):PE icon
dhash icon b000921ecac4c469 (1 x NetSupport, 1 x Chaos, 1 x Metasploit)
Reporter petikvx
Tags:Chaos exe Keygroup Ransomware

Intelligence


File Origin
# of uploads :
1
# of downloads :
516
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
ProtonVPN_win_v2.2.0.bin
Verdict:
Malicious activity
Analysis date:
2022-11-10 05:05:02 UTC
Tags:
ransomware

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Sending a custom TCP request
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
overlay packed poison shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
rans.expl.evad
Score:
100 / 100
Signature
.NET source code contains very large strings
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Creates files inside the volume driver (system volume information)
Deletes shadow drive data (may be related to ransomware)
Deletes the backup plan of Windows
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files with benign system names
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found ransom note / readme
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May disable shadow drive data (uses vssadmin)
Modifies existing user documents (likely ransomware behavior)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Delete shadow copy via WMIC
Sigma detected: Drops script at startup location
Tries to detect virtualization through RDTSC time measurements
Uses bcdedit to modify the Windows boot settings
Yara detected Chaos Ransomware
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 742692 Sample: ProtonVPN_win_v2.2.0.bin.exe Startdate: 10/11/2022 Architecture: WINDOWS Score: 100 82 Malicious sample detected (through community Yara rule) 2->82 84 Antivirus / Scanner detection for submitted sample 2->84 86 Multi AV Scanner detection for submitted file 2->86 88 8 other signatures 2->88 9 ProtonVPN_win_v2.2.0.bin.exe 2 10 2->9         started        13 cmd.exe 2->13         started        15 cmd.exe 2->15         started        17 8 other processes 2->17 process3 file4 78 C:\Windows\main.exe, PE32 9->78 dropped 80 C:\Windows\SysWOW64\TEOFSE.exe, PE32 9->80 dropped 102 Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors) 9->102 104 Drops executables to the windows directory (C:\Windows) and starts them 9->104 106 Tries to detect virtualization through RDTSC time measurements 9->106 19 main.exe 3 9->19         started        23 TEOFSE.exe 9->23         started        108 May disable shadow drive data (uses vssadmin) 13->108 110 Deletes shadow drive data (may be related to ransomware) 13->110 112 Uses bcdedit to modify the Windows boot settings 13->112 25 conhost.exe 13->25         started        27 vssadmin.exe 13->27         started        29 WMIC.exe 13->29         started        31 conhost.exe 15->31         started        35 2 other processes 15->35 114 Creates files inside the volume driver (system volume information) 17->114 116 Deletes the backup plan of Windows 17->116 33 svchost.exe 17->33         started        37 2 other processes 17->37 signatures5 process6 file7 68 C:\Users\user\AppData\Roaming\svchost.exe, PE32 19->68 dropped 90 Multi AV Scanner detection for dropped file 19->90 92 Drops PE files with benign system names 19->92 39 svchost.exe 49 19->39         started        signatures8 process9 file10 70 C:\Users\user\Documents\...\README8.txt, ASCII 39->70 dropped 72 C:\Users\user\Desktop\...\QCOILOQIKC.pdf, ASCII 39->72 dropped 74 ProtonVPN_win_v2.2...bPQb6-PrwjRN (copy), ASCII 39->74 dropped 76 4 other malicious files 39->76 dropped 94 Antivirus detection for dropped file 39->94 96 Multi AV Scanner detection for dropped file 39->96 98 Machine Learning detection for dropped file 39->98 100 3 other signatures 39->100 43 cmd.exe 39->43         started        46 cmd.exe 39->46         started        48 cmd.exe 39->48         started        50 notepad.exe 39->50         started        signatures11 process12 signatures13 118 May disable shadow drive data (uses vssadmin) 43->118 120 Deletes shadow drive data (may be related to ransomware) 43->120 52 conhost.exe 43->52         started        54 vssadmin.exe 43->54         started        56 WMIC.exe 43->56         started        122 Uses bcdedit to modify the Windows boot settings 46->122 58 conhost.exe 46->58         started        60 bcdedit.exe 46->60         started        62 bcdedit.exe 46->62         started        124 Deletes the backup plan of Windows 48->124 64 conhost.exe 48->64         started        66 wbadmin.exe 48->66         started        process14
Threat name:
Win32.Trojan.VBinder
Status:
Malicious
First seen:
2022-11-10 05:07:11 UTC
File Type:
PE (Exe)
Extracted files:
17
AV detection:
26 of 26 (100.00%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:chaos evasion persistence ransomware spyware stealer
Behaviour
Checks SCSI registry key(s)
Interacts with shadow copies
Modifies registry class
Opens file in notepad (likely ransom note)
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Windows directory
Drops file in System32 directory
Sets desktop wallpaper using registry
Adds Run key to start application
Drops desktop.ini file(s)
Checks computer location settings
Drops startup file
Loads dropped DLL
Reads user/profile data of web browsers
Deletes backup catalog
Executes dropped EXE
Deletes shadow copies
Modifies boot configuration data using bcdedit
Chaos
Chaos Ransomware
Verdict:
Informative
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
7a55cb47603215c0a5ff58c65f45cb344b253ce4138fe0ed0ceca54ae326496b
MD5 hash:
ba572e23787153237a7dcd68fe7256b9
SHA1 hash:
6882acfba0cfe55d8d977dce6884ded19557f91c
SH256 hash:
4b922409207ad4662325f16ba79bb9ff2a7f408deee9ea6a99c5a267c4cec602
MD5 hash:
916ca2273debc1743307562e9b16aabd
SHA1 hash:
240b8e460be45891cd2529620b13afd230c5bc47
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments