MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e8af6b996ef72510ec7af7342f3a046c4e6ef20fc717af3091ba03a72ffd89ee. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Chaos


Vendor detections: 11


Intelligence 11 IOCs YARA 5 File information Comments

SHA256 hash: e8af6b996ef72510ec7af7342f3a046c4e6ef20fc717af3091ba03a72ffd89ee
SHA3-384 hash: 42e36399ee90973894b7bf7011e210f9239312ee04c14fa8b2e14466165164a7689d6bdfa711fecc7830cae8138d58ce
SHA1 hash: e52458822912fbd89249b9dae5b24692b8e67cca
MD5 hash: 94d2ef7db81197413140692de0985b00
humanhash: bluebird-cola-montana-edward
File name:e8af6b996ef72510ec7af7342f3a046c4e6ef20fc717af3091ba03a72ffd89ee
Download: download sample
Signature Chaos
File size:679'936 bytes
First seen:2024-11-02 16:20:44 UTC
Last seen:Never
File type:Microsoft Software Installer (MSI) msi
MIME type:application/x-msi
ssdeep 12288:qtVRQ+gjpjegDro8EdWd10DTCW1uF+Sf2ppmvrfOgR7a+9Rd:qt9cpVDhE81ckhmIvrfnUA
TLSH T1C4E46C013BE9803DF1BB1A354EF467959B3AFC616B26C58F1210F5595A33AC1CCA43BA
TrID 91.1% (.MSI) Microsoft Windows Installer (454500/1/170)
7.2% (.4PK) Perfect Keyboard macro set (36000/1/2)
1.6% (.) Generic OLE2 / Multistream Compound (8000/1)
Magika msi
Reporter JAMESWT_WT
Tags:Chaos msi Ransomware

Intelligence


File Origin
# of uploads :
1
# of downloads :
156
Origin country :
IT IT
Vendor Threat Intelligence
Verdict:
Malicious
Score:
95.7%
Tags:
ransomware shellcode dropper
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-security cmd crypto expand fingerprint installer keylogger lolbin overlay packed ransomware wix wmic
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
rans.evad
Score:
100 / 100
Signature
.NET source code contains very large strings
AI detected suspicious sample
Antivirus detection for dropped file
Creates files with lurking names (e.g. Crack.exe)
Deletes shadow drive data (may be related to ransomware)
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Chaos Ransomware
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1547558 Sample: LsP7DaCP02.msi Startdate: 02/11/2024 Architecture: WINDOWS Score: 100 52 Malicious sample detected (through community Yara rule) 2->52 54 Antivirus detection for dropped file 2->54 56 Multi AV Scanner detection for dropped file 2->56 58 6 other signatures 2->58 8 msiexec.exe 3 14 2->8         started        11 msiexec.exe 5 2->11         started        process3 file4 42 C:\Windows\Installer\MSI223C.tmp, PE32 8->42 dropped 44 C:\Windows\Installer\632113.msi, Composite 8->44 dropped 13 msiexec.exe 5 8->13         started        process5 file6 48 C:\Users\user\AppData\Local\...\files.cab, Microsoft 13->48 dropped 16 keygenran.exe 13->16         started        19 expand.exe 4 13->19         started        22 icacls.exe 1 13->22         started        24 2 other processes 13->24 process7 file8 50 Deletes shadow drive data (may be related to ransomware) 16->50 26 WerFault.exe 19 16 16->26         started        38 C:\Users\user\...\keygenran.exe (copy), PE32 19->38 dropped 40 C:\...\a7fada7d6642434cb2808cd0a07a9b26.tmp, PE32 19->40 dropped 30 conhost.exe 19->30         started        32 conhost.exe 22->32         started        34 conhost.exe 24->34         started        36 conhost.exe 24->36         started        signatures9 process10 file11 46 C:\ProgramData\Microsoft\...\Report.wer, Unicode 26->46 dropped 60 Creates files with lurking names (e.g. Crack.exe) 26->60 signatures12
Threat name:
ByteCode-MSIL.Ransomware.Imps
Status:
Malicious
First seen:
2024-10-15 10:28:09 UTC
File Type:
Binary (Archive)
Extracted files:
118
AV detection:
18 of 24 (75.00%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:chaos discovery persistence privilege_escalation ransomware
Behaviour
Checks SCSI registry key(s)
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Uses Volume Shadow Copy service COM API
Event Triggered Execution: Installer Packages
System Location Discovery: System Language Discovery
Drops file in Windows directory
Executes dropped EXE
Loads dropped DLL
Enumerates connected drives
Modifies file permissions
Chaos
Chaos Ransomware
Chaos family
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:INDICATOR_SUSPICIOUS_GENRansomware
Author:ditekSHen
Description:Detects command variations typically used by ransomware
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:RANSOMWARE
Author:ToroGuitar

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments