General

  • Target

    262a1s0ssssd7da.exe

  • Size

    717KB

  • Sample

    200709-14znsqlr8s

  • MD5

    07ce42f25f61cff26f984e17163edb14

  • SHA1

    ee189c7c5e1cc3584fe3e4aa5f7ded0afa23b222

  • SHA256

    09344b412ef8dbc6b398dd6e3580f482382bd24b672554039668b17a39661b50

  • SHA512

    fada769397f97cf32518a9b426a4c16ca99d0a9076d9e4ad6eeed2c3d7fb84edc5198bd5483de6d5d12a495292fab11c9c566283fd71abe66578c2f643b81795

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0011-0000-1000-0000000FF1CE}-C\Read_Me.txt

Ransom Note
Attention! All your files, documents, photos, databases and other important files are encrypted The only method of recovering files is to purchase an unique decryptor. Only we can give you this decryptor and only we can recover your files. The server with your decryptor is in a closed network TOR. You can get there by the following ways: ---------------------------------------------------------------------------------------- 1. Download Tor browser - https://www.torproject.org/ 2. Install Tor browser 3. Open Tor Browser 4. Open link in TOR browser: http://7rzpyw3hflwe2c7h.onion/?FFFFFFFF 5. Follow the instructions on this page ---------------------------------------------------------------------------------------- On our page you will see instructions on payment and get the opportunity to decrypt 1 file for free. Alternate communication channel here: http://helpqvrg3cc5mvb3.onion/
URLs

http://7rzpyw3hflwe2c7h.onion/?FFFFFFFF

http://helpqvrg3cc5mvb3.onion/

Extracted

Path

\??\M:\Read_Me.txt

Ransom Note
Attention! All your files, documents, photos, databases and other important files are encrypted The only method of recovering files is to purchase an unique decryptor. Only we can give you this decryptor and only we can recover your files. The server with your decryptor is in a closed network TOR. You can get there by the following ways: ---------------------------------------------------------------------------------------- 1. Download Tor browser - https://www.torproject.org/ 2. Install Tor browser 3. Open Tor Browser 4. Open link in TOR browser: http://7rzpyw3hflwe2c7h.onion/?JLNOQRTV 5. Follow the instructions on this page ---------------------------------------------------------------------------------------- On our page you will see instructions on payment and get the opportunity to decrypt 1 file for free. Alternate communication channel here: http://helpqvrg3cc5mvb3.onion/
URLs

http://7rzpyw3hflwe2c7h.onion/?JLNOQRTV

http://helpqvrg3cc5mvb3.onion/

Targets

    • Target

      262a1s0ssssd7da.exe

    • Size

      717KB

    • MD5

      07ce42f25f61cff26f984e17163edb14

    • SHA1

      ee189c7c5e1cc3584fe3e4aa5f7ded0afa23b222

    • SHA256

      09344b412ef8dbc6b398dd6e3580f482382bd24b672554039668b17a39661b50

    • SHA512

      fada769397f97cf32518a9b426a4c16ca99d0a9076d9e4ad6eeed2c3d7fb84edc5198bd5483de6d5d12a495292fab11c9c566283fd71abe66578c2f643b81795

    • Modifies Installed Components in the registry

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

    • Modifies service

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks