General

  • Target

    703a1s0ssssd7da.exe

  • Size

    717KB

  • Sample

    200709-jx6g2egsna

  • MD5

    83f6e8129fd4917311956264f46971f0

  • SHA1

    183757c527e8f213be0c1397f40b6cd3979c854c

  • SHA256

    a7add0057b62fd19144486d1933b3a68331aebab989192d3f32e5c85f07b8590

  • SHA512

    1a31f54a50f6d09765ca1be1c39ac1d6a200e8564926155eab7249407e48029aba312976ccc09328679cf9b0629f7af0448af98ecea6ee0c3c68fc24905bb7d8

Malware Config

Extracted

Path

\??\M:\Boot\cs-CZ\Read_Me.txt

Ransom Note
Attention! All your files, documents, photos, databases and other important files are encrypted The only method of recovering files is to purchase an unique decryptor. Only we can give you this decryptor and only we can recover your files. The server with your decryptor is in a closed network TOR. You can get there by the following ways: ---------------------------------------------------------------------------------------- 1. Download Tor browser - https://www.torproject.org/ 2. Install Tor browser 3. Open Tor Browser 4. Open link in TOR browser: http://7rzpyw3hflwe2c7h.onion/?FFFFFFFF 5. Follow the instructions on this page ---------------------------------------------------------------------------------------- On our page you will see instructions on payment and get the opportunity to decrypt 1 file for free. Alternate communication channel here: http://helpqvrg3cc5mvb3.onion/
URLs

http://7rzpyw3hflwe2c7h.onion/?FFFFFFFF

http://helpqvrg3cc5mvb3.onion/

Extracted

Path

\??\M:\Read_Me.txt

Ransom Note
Attention! All your files, documents, photos, databases and other important files are encrypted The only method of recovering files is to purchase an unique decryptor. Only we can give you this decryptor and only we can recover your files. The server with your decryptor is in a closed network TOR. You can get there by the following ways: ---------------------------------------------------------------------------------------- 1. Download Tor browser - https://www.torproject.org/ 2. Install Tor browser 3. Open Tor Browser 4. Open link in TOR browser: http://7rzpyw3hflwe2c7h.onion/?XOQRTVWY 5. Follow the instructions on this page ---------------------------------------------------------------------------------------- On our page you will see instructions on payment and get the opportunity to decrypt 1 file for free. Alternate communication channel here: http://helpqvrg3cc5mvb3.onion/
URLs

http://7rzpyw3hflwe2c7h.onion/?XOQRTVWY

http://helpqvrg3cc5mvb3.onion/

Targets

    • Target

      703a1s0ssssd7da.exe

    • Size

      717KB

    • MD5

      83f6e8129fd4917311956264f46971f0

    • SHA1

      183757c527e8f213be0c1397f40b6cd3979c854c

    • SHA256

      a7add0057b62fd19144486d1933b3a68331aebab989192d3f32e5c85f07b8590

    • SHA512

      1a31f54a50f6d09765ca1be1c39ac1d6a200e8564926155eab7249407e48029aba312976ccc09328679cf9b0629f7af0448af98ecea6ee0c3c68fc24905bb7d8

    • Modifies Installed Components in the registry

    • Registers COM server for autorun

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

    • Modifies service

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks