MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d2238bcff8d4ff94256c8df702a31182763fa55325040cd484bc9abae2e69c5a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Chaos


Vendor detections: 12


Intelligence 12 IOCs YARA 11 File information Comments

SHA256 hash: d2238bcff8d4ff94256c8df702a31182763fa55325040cd484bc9abae2e69c5a
SHA3-384 hash: 7b7bf3b0cade5ea95f7c4f65b236dc3b91d65a1c54ed73c0e673f8397d538dcb2c26782a733d77b9367160961fdf2e86
SHA1 hash: 884ccde1c4732feadc44acf4c9289d97e3004d83
MD5 hash: 28a4c68d4aff7e58d321065189fd68e3
humanhash: west-alabama-fish-ten
File name:d2238bcff8d4ff94256c8df702a31182763fa55325040cd484bc9abae2e69c5a
Download: download sample
Signature Chaos
File size:554'496 bytes
First seen:2022-09-27 08:51:32 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'859 x AgentTesla, 19'785 x Formbook, 12'305 x SnakeKeylogger)
ssdeep 12288:O4yERcXVFIXLfmSYgkkL+8h+afxQl9OUVfU:gI7rbp8
Threatray 2'638 similar samples on MalwareBazaar
TLSH T18BC4DB342DFA501AB0B3EF7D9BE8759BD9AEB7722703549D207103864623D43DD8293A
TrID 72.5% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.4% (.EXE) Win64 Executable (generic) (10523/12/4)
6.5% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.4% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.EXE) OS/2 Executable (generic) (2029/13)
Reporter petikvx
Tags:Chaos exe OkHacked Ransomware

Intelligence


File Origin
# of uploads :
1
# of downloads :
535
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
d2238bcff8d4ff94256c8df702a31182763fa55325040cd484bc9abae2e69c5a.exe
Verdict:
Malicious activity
Analysis date:
2022-09-27 09:22:25 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Creating a file in the %AppData% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Running batch commands
Creating a process with a hidden window
Launching a service
Launching a process
Searching for synchronization primitives
Creating a file in the Windows subdirectories
Unauthorized injection to a recently created process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Deleting volume shadow copies
Preventing system recovery
Blocking a possibility to launch for the Windows Task Manager (taskmgr)
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
azorult cmd.exe filecoder hydracrypt packed ransomware virus
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Chaos, Voidcrypt
Detection:
malicious
Classification:
rans.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large strings
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Contains functionality to disable the Task Manager (.Net Source)
Creates files inside the volume driver (system volume information)
Deletes itself after installation
Deletes shadow drive data (may be related to ransomware)
Deletes the backup plan of Windows
Disables the Windows task manager (taskmgr)
Found ransom note / readme
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May disable shadow drive data (uses vssadmin)
Modifies existing user documents (likely ransomware behavior)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Delete shadow copy via WMIC
Tries to harvest and steal browser information (history, passwords, etc)
Uses bcdedit to modify the Windows boot settings
Writes many files with high entropy
Yara detected Chaos Ransomware
Yara detected Voidcrypt Ransomware
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 710705 Sample: CbXtCKtjiw.exe Startdate: 27/09/2022 Architecture: WINDOWS Score: 100 84 Malicious sample detected (through community Yara rule) 2->84 86 Antivirus / Scanner detection for submitted sample 2->86 88 Multi AV Scanner detection for submitted file 2->88 90 8 other signatures 2->90 8 CbXtCKtjiw.exe 5 2->8         started        11 okhacked.exe 2->11         started        14 wbengine.exe 2->14         started        16 4 other processes 2->16 process3 file4 72 C:\Users\user\AppData\Roaming\okhacked.exe, PE32 8->72 dropped 74 C:\Users\user\AppData\...\CbXtCKtjiw.exe.log, CSV 8->74 dropped 18 okhacked.exe 2 502 8->18         started        76 C:\Users\user\...\edb00002.log.okhacked, data 11->76 dropped 78 C:\Users\user\...\CbXtCKtjiw.exe.okhacked, data 11->78 dropped 80 CachedImage_1280_1024_POS4.jpg.okhacked, data 11->80 dropped 82 C:\...\Built-In Building Blocks.dotx.okhacked, data 11->82 dropped 108 Deletes shadow drive data (may be related to ransomware) 11->108 110 Uses bcdedit to modify the Windows boot settings 11->110 112 Tries to harvest and steal browser information (history, passwords, etc) 11->112 116 2 other signatures 11->116 22 cmd.exe 11->22         started        24 cmd.exe 11->24         started        26 cmd.exe 11->26         started        114 Creates files inside the volume driver (system volume information) 14->114 signatures5 process6 file7 64 C:\Users\user\...\edb00001.log.okhacked, data 18->64 dropped 66 C:\Users\user\...\okhacked.exe.okhacked, data 18->66 dropped 68 C:\Users\user\...\TURABIAN.XSL.okhacked, data 18->68 dropped 70 14 other malicious files 18->70 dropped 92 Antivirus detection for dropped file 18->92 94 Multi AV Scanner detection for dropped file 18->94 96 Machine Learning detection for dropped file 18->96 106 3 other signatures 18->106 28 cmd.exe 1 18->28         started        31 cmd.exe 1 18->31         started        33 cmd.exe 1 18->33         started        98 May disable shadow drive data (uses vssadmin) 22->98 100 Deletes shadow drive data (may be related to ransomware) 22->100 35 conhost.exe 22->35         started        37 vssadmin.exe 22->37         started        39 WMIC.exe 22->39         started        102 Uses bcdedit to modify the Windows boot settings 24->102 41 conhost.exe 24->41         started        43 2 other processes 24->43 104 Deletes the backup plan of Windows 26->104 45 2 other processes 26->45 signatures8 process9 signatures10 118 May disable shadow drive data (uses vssadmin) 28->118 120 Deletes shadow drive data (may be related to ransomware) 28->120 122 Uses bcdedit to modify the Windows boot settings 28->122 47 conhost.exe 28->47         started        50 WMIC.exe 1 28->50         started        52 vssadmin.exe 1 28->52         started        54 bcdedit.exe 8 1 31->54         started        56 bcdedit.exe 7 1 31->56         started        58 conhost.exe 31->58         started        124 Deletes the backup plan of Windows 33->124 60 conhost.exe 33->60         started        62 wbadmin.exe 3 33->62         started        process11 signatures12 126 Deletes shadow drive data (may be related to ransomware) 47->126 128 Uses bcdedit to modify the Windows boot settings 47->128
Threat name:
ByteCode-MSIL.Ransomware.HydraCrypt
Status:
Malicious
First seen:
2022-09-26 08:17:46 UTC
File Type:
PE (.Net Exe)
Extracted files:
1
AV detection:
32 of 40 (80.00%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:chaos evasion persistence ransomware spyware stealer
Behaviour
Checks SCSI registry key(s)
Interacts with shadow copies
Modifies registry class
Opens file in notepad (likely ransom note)
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Sets desktop wallpaper using registry
Adds Run key to start application
Drops desktop.ini file(s)
Checks computer location settings
Drops startup file
Reads user/profile data of web browsers
Deletes backup catalog
Disables Task Manager via registry modification
Executes dropped EXE
Modifies extensions of user files
Deletes shadow copies
Modifies boot configuration data using bcdedit
Chaos
Chaos Ransomware
Unpacked files
SH256 hash:
d2238bcff8d4ff94256c8df702a31182763fa55325040cd484bc9abae2e69c5a
MD5 hash:
28a4c68d4aff7e58d321065189fd68e3
SHA1 hash:
884ccde1c4732feadc44acf4c9289d97e3004d83
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_GENRansomware
Author:ditekSHen
Description:detects command variations typically used by ransomware
Rule name:INDICATOR_SUSPICOUS_EXE_References_VEEAM
Author:ditekSHen
Description:Detects executables containing many references to VEEAM. Observed in ransomware
Rule name:MALWARE_Win_Chaos
Author:ditekSHen
Description:Detects Chaos ransomware
Rule name:pe_imphash
Rule name:RansomwareTest2
Author:Daoyuan Wu
Description:Test Ransomware YARA rules
Rule name:RansomwareTest3
Author:Daoyuan Wu
Description:Test Ransomware YARA rules
Rule name:RansomwareTest4
Author:Daoyuan Wu
Description:Test Ransomware YARA rules
Rule name:RansomwareTest5
Author:Daoyuan Wu
Description:Test Ransomware YARA rules
Rule name:RansomwareTest6
Author:Daoyuan Wu
Description:Test Ransomware YARA rules
Rule name:RansomwareTest7
Author:Daoyuan Wu
Description:Test Ransomware YARA rules
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments