General

  • Target

    401vv53.exe

  • Size

    156KB

  • Sample

    200713-ranxqklxnj

  • MD5

    347b7f72594a3ca032e578cd191c018e

  • SHA1

    2bbc36e17066b640d34fbe6e3e52a10f78dbc6aa

  • SHA256

    63b62266bd430cd093c6ee885cbe42c303536dcf223d2157188820b729f29abd

  • SHA512

    cc205391bc7fda31076008b7a77609832c28b0c875625dbfcec036f6b8015bee1817f9b4c2f531131b299f7c4f5bedaa76430c4df3870b0fa15e2b6d7b6435a1

Malware Config

Extracted

Path

\??\M:\Boot\cs-CZ\Read_Me.txt

Ransom Note
Attention! All your files, documents, photos, databases and other important files are encrypted The only method of recovering files is to purchase an unique decryptor. Only we can give you this decryptor and only we can recover your files. The server with your decryptor is in a closed network TOR. You can get there by the following ways: ---------------------------------------------------------------------------------------- 1. Download Tor browser - https://www.torproject.org/ 2. Install Tor browser 3. Open Tor Browser 4. Open link in TOR browser: http://7rzpyw3hflwe2c7h.onion/?LLLLLLLL 5. Follow the instructions on this page ---------------------------------------------------------------------------------------- On our page you will see instructions on payment and get the opportunity to decrypt 1 file for free. Alternate communication channel here: http://helpqvrg3cc5mvb3.onion/
URLs

http://7rzpyw3hflwe2c7h.onion/?LLLLLLLL

http://helpqvrg3cc5mvb3.onion/

Targets

    • Target

      401vv53.exe

    • Size

      156KB

    • MD5

      347b7f72594a3ca032e578cd191c018e

    • SHA1

      2bbc36e17066b640d34fbe6e3e52a10f78dbc6aa

    • SHA256

      63b62266bd430cd093c6ee885cbe42c303536dcf223d2157188820b729f29abd

    • SHA512

      cc205391bc7fda31076008b7a77609832c28b0c875625dbfcec036f6b8015bee1817f9b4c2f531131b299f7c4f5bedaa76430c4df3870b0fa15e2b6d7b6435a1

    • Modifies Installed Components in the registry

    • Registers COM server for autorun

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

    • Modifies service

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks