General

  • Target

    62a107

  • Size

    156KB

  • Sample

    200713-1gfknc8nwa

  • MD5

    ddb0136ad007d0b77ca903688776dbc6

  • SHA1

    f3d9ca6d33be62b382b3ed2446b733938cac5245

  • SHA256

    5852518bca655111976a3d44d8418dac0fcdf45338a5a00e66a9e9d4d2dd6122

  • SHA512

    088b2d10929c834f2b52016bb6df50b4eabc2cca4699fc052bf1113c6285946e72a53c69ac466221febef595e83f433117dd462746d0cd0f6645807b0a708b78

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0011-0000-1000-0000000FF1CE}-C\Read_Me.txt

Ransom Note
Attention! All your files, documents, photos, databases and other important files are encrypted The only method of recovering files is to purchase an unique decryptor. Only we can give you this decryptor and only we can recover your files. The server with your decryptor is in a closed network TOR. You can get there by the following ways: ---------------------------------------------------------------------------------------- 1. Download Tor browser - https://www.torproject.org/ 2. Install Tor browser 3. Open Tor Browser 4. Open link in TOR browser: http://7rzpyw3hflwe2c7h.onion/?QQQQQQQQ 5. Follow the instructions on this page ---------------------------------------------------------------------------------------- On our page you will see instructions on payment and get the opportunity to decrypt 1 file for free. Alternate communication channel here: http://helpqvrg3cc5mvb3.onion/
URLs

http://7rzpyw3hflwe2c7h.onion/?QQQQQQQQ

http://helpqvrg3cc5mvb3.onion/

Targets

    • Target

      62a107

    • Size

      156KB

    • MD5

      ddb0136ad007d0b77ca903688776dbc6

    • SHA1

      f3d9ca6d33be62b382b3ed2446b733938cac5245

    • SHA256

      5852518bca655111976a3d44d8418dac0fcdf45338a5a00e66a9e9d4d2dd6122

    • SHA512

      088b2d10929c834f2b52016bb6df50b4eabc2cca4699fc052bf1113c6285946e72a53c69ac466221febef595e83f433117dd462746d0cd0f6645807b0a708b78

    • Modifies Installed Components in the registry

    • Registers COM server for autorun

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

    • Modifies service

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Modify Existing Service

1
T1031

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks