sekhmet2.zip

General
Target

sekhmet2.zip

Size

318KB

Sample

201001-lbxang9l8s

Score
10 /10
MD5

157fb586ebaa260904192bc1e6f604dc

SHA1

8f54c1e3e997e9633adc05c37844362d095f1fe3

SHA256

b39d282a9048f423bc8344b9f10c6165513d3bd36b960a2d17267ad529eff416

SHA512

47495c37c14fb8f533e0c97c6c746cdd10bc79a8cf4523b5f599581b68babcca0fb59054d7de7f0d74aaef337414daba9d1d9840c3f5a480e5099e9a52d0dc6f

Malware Config

Extracted

Path C:\RECOVER-FILES.txt
Family sekhmet
Ransom Note
-------------- | Attention! | -------------- Your company network has been hacked and breached. We downloaded confidential and private data. In case of not contacting us in 3 business days this data will be published on a special website available for public view. Also we had executed a special software that turned files, databases and other important data in your network into an encrypted state using RSA-2048 and ChaCha algorithms. A special key is required to decrypt and restore these files. Only we have this key and only we can give it to you with a reliable decryption software. --------------------------------------- | How to contact us and be safe again | --------------------------------------- The only method to restore your files and be safe from data leakage is to purchase a private key which is unique for you and securely stored on our servers. After the payment we provide you with decryption software that will decrypt all your files, also we remove the downloaded data from your network and never post any information about you. There are 2 ways to directly contact us: 1) Using hidden TOR network: a) Download a special TOR browser: https://www.torproject.org/ b) Install the TOR browser c) Open our website in the TOR browser: http://o3n4bhhtybbtwqqs.onion/BC9E9E1D889C83A d) Follow the instructions on this page. 2) If you have any problems connecting or using TOR network a) Open our website: https://sekhmet.top/BC9E9E1D889C83A b) Follow the instructions on this page On this web site, you will get instructions on how to make a free decryption test and how to pay. Also it has a live chat with our operators and support team. ----------------------- |Questions and answers| ----------------------- We understand you may have questions, so we provide here answers to the frequently asked questions. ==== Q: What about decryption guarantees? A: You have a FREE opportunity to test a service by instantly decrypting for free 3 files from every system in your network. If you have any problems our friendly support team is always here to assist you in a live chat. ==== ==== Q: How can we be sure that after the payment data is removed and not published or used in any nefarious ways? A: We can assure you, downloaded data will be securely removed using DoD 5220.22-M wiping standart. We are not interested in keeping this data as we do not gain any profit from it. This data is used only to leverage you to make a payment and nothing more. On the market the data itself are relatively useless and cheap. Also we perfectly understand that using or publishing this data after the payment will compromise our reliable business operations and we are not interested in it. ==== ==== Q: How did you get into the network? A: Detailed report on how we did it and how to fix your vulnerabilities can be provided by request after the payment. ==== -------------------------------------------------------------------------------------- This is techinal information we need to identify you correctly and give decryption key to you, do not redact! ---SEKHMET--- D9MmbMMQNVQwMqIi6unOkpBh6gqAYZCx1HZqRbCcYgHvuKL/Qfs7s5X27b4pWezxd+il/rNdXnKCHEse6fWnH+uiiUDDu+FzpGlf3GSexC3sHEsRhigeHRJ29/m8jGoPXs4GoRGR7a+ArYLeF3o4hO0tS1wDj6n68aLAGUN/B28xB+6zPajNcl6PzAfzC+UlNep3fCM05ZVoUv3yXiwZqs+65RzDkiMFd2dYpoPIxyttgxA8t3cdFPygTb34PdZvaJme1pF+cecr06X09dc+2U99vkV73jyVb38bDuEDIwLlci/gJY7V6KQ+gqREy2/TUZ0mVcHtJLo35x1ww7o5E6rY4uMd/wHtJXteQJPv1Qw7HajAUjbUdZwtre6Xlo8gCmrejxVTwCDcUFjN5cBLLoPOTUfdf530+4Q9SG9e6gIFGXvTO/5CACJ3bHNtJQHK9mSGgT+MCQYxSaCOrqWbHcwdDUlsNWPiZDuY01vGmI0L+qyZLfzMfbbf1Bvvnej8zd/HvGemRn6DiOEa8xU0WQqBtutsK0nFqw1tiTWEbHDo7gLkLTQTAz0SiUpMTBBGxmUIjr0JnG4jpYoErgxM0iRjhWF5m2OQ/2YZPkC3TzuT/DuDTbuFbjMFPhPanmSrqxHU5R0A5DD1dpTXBYRMSOGYfqUkJDockx6kckynBMKPrej3znbmdaN1C6pXIHKWdBIWVeSFGV+OxQWB+v8HEf9zZshQXUKZuYIogaSvJIKuCN2fAsgjXYGmESA/0ztSI22q2h5ok+p00mRhsPVHS8Xlo3eXXXxFWvEUoqFdwH4j+scQVfImgNC0yQSrHnu6KT0OrqoPuLJXihHIwKixIUMCAHz4fLD6gfaAoc5N+dS89ZfDGsPNSpK3d6MmiF1hbsOnsVXEfphR1/71hVlXgfO0JR9tE/yg6pNc41lOx+DaGTSYonNDYB1QWzdmSgaahfMMI1K/WL6TUBH0tn/wdpJNqmAmJpRSvFBkHh+jsW4ohzs1Ss0tR0jisW7ZsHhF+axLwAiB1T1/N/MStbJwdqzqQ2ytTDByQusLxVGaXH1wy45U+7UgqDzuh0ZFWGCxu1uZc/sjdNM34H88T1yrUuEVDweaTBaCXFwmEbOvPf69+CKt1X8ZM+mmRubdiJ4xegQ75QS+cgCPdH2OTGLxt+YFIZuo8meFhE511RD4kHyD9nIMXDePdGdpKsMj0FE7Q7P9Vsr8LUDnn63uxIADyz+Cz7XKSbqs9sAdkMBcUA+K9U0X4WIkeWnl6Y9XIjgJLuPBlAYLEHw3hwwOlkFq8GNrF2h1AxYEOl1Ttw8LfmR2NwR/N8gyWYa0LF1AAbuZia2BRY4GI2wxcQVaXNcnmRE/IY+WmdVnJ214Alq3bkBBmZB0NsBOmYcppjPlah6q/yG+7LD3ObsAiihuRKhyoXR4LIvquPmVMHZxHncvZt/HnHLWMLhsCpWJ9V7bKXPLG+Ihfi6NniuNH7o0S3Jvt8jCSuZydvpINeevUxK0zELWNtWtqagW68wxraN4x1Lk0BqCU5qJEybm2TFBcjpL/RGH9WtN4IIiQ8bIlqxXMi5xut/Eu+hh4V/hPOBQPzaHkePgvV7NG/FcxpaiUwJAW9Lr0x092Mm5OKr9x1zlzRdg1q1NCmK03J+4q3E2Dxs7VJpJgVzfSCROTB5IwVEhY6abNxJ4J4NopEQ46SkgXwSIUlNFG8rf15BymIE1sG1FNMaPil8KnXA2/Tzj9jef7tZXMYXdpRsY16hr+/4JmG2BpkrGuJwG8dq4CIPH+Z7g7nFeSSL+F6jb3ZVPz2qjSdhORRPCekrDI7q3hqenFYUK1P0i4WJgtQoOiNKypp4dlBRljduDSjN9RbH8iDhKNXiQ87s/x0UPWQVH1jAUGYOlzHWWxjBT8ZCQ6atbjeholYFKLuvuTKpFFu8LNzuBiAdvTzA/ZjrE8abWph3uKJwRAiBPtU6HT59eT4etDp2ZEaPVde+OhuBygfV7VRqRA/E8mAnn7PA7FhbPjVJa55Ngz5cLhGUXiu6fICyqCJgxInYCzL5Z1gaYE8PhHp/AAxGP5aPZ+6ZyMZWt1QSfZsJPixQKCC5PRWWY457bo209I6Jrs2jTwLS9byejf+8Z26Jlwqsyji9pnR1dTlntpvPvl/CT1mBSJl/ATdA7lfkRONxWIrl2D+0HXM9zwsiaxtzu3iEghk07tbKFPpClhe5ob4P4lqHLoYcg4k8k9deYOqMykggBEAEYASCAAigAOhJBAFYARwBMAEYARQBTAEIAAABCIEIAQwA5AEUAOQBFADEARAA4ADgAOQBDADgAMwBBAAAASjh8AEMAOgBGAF8AMgA0ADMANAA2ADIALwAyADYAMQA4ADQAMQB8AEQAOgBDAF8AMAAvADAAfAAAAFIMQQBkAG0AaQBuAAAAaAByLlcAaQBuAGQAbwB3AHMAIAA3ACAAUAByAG8AZgBlAHMAcwBpAG8AbgBhAGwAAAB6FFcATwBSAEsARwBSAE8AVQBQAAAA ---SEKHMET---
URLs

http://o3n4bhhtybbtwqqs.onion/BC9E9E1D889C83A

https://sekhmet.top/BC9E9E1D889C83A

Extracted

Path C:\RECOVER-FILES.txt
Family sekhmet
Ransom Note
-------------- | Attention! | -------------- Your company network has been hacked and breached. We downloaded confidential and private data. In case of not contacting us in 3 business days this data will be published on a special website available for public view. Also we had executed a special software that turned files, databases and other important data in your network into an encrypted state using RSA-2048 and ChaCha algorithms. A special key is required to decrypt and restore these files. Only we have this key and only we can give it to you with a reliable decryption software. --------------------------------------- | How to contact us and be safe again | --------------------------------------- The only method to restore your files and be safe from data leakage is to purchase a private key which is unique for you and securely stored on our servers. After the payment we provide you with decryption software that will decrypt all your files, also we remove the downloaded data from your network and never post any information about you. There are 2 ways to directly contact us: 1) Using hidden TOR network: a) Download a special TOR browser: https://www.torproject.org/ b) Install the TOR browser c) Open our website in the TOR browser: http://o3n4bhhtybbtwqqs.onion/B36B1ABBE151F36D d) Follow the instructions on this page. 2) If you have any problems connecting or using TOR network a) Open our website: https://sekhmet.top/B36B1ABBE151F36D b) Follow the instructions on this page On this web site, you will get instructions on how to make a free decryption test and how to pay. Also it has a live chat with our operators and support team. ----------------------- |Questions and answers| ----------------------- We understand you may have questions, so we provide here answers to the frequently asked questions. ==== Q: What about decryption guarantees? A: You have a FREE opportunity to test a service by instantly decrypting for free 3 files from every system in your network. If you have any problems our friendly support team is always here to assist you in a live chat. ==== ==== Q: How can we be sure that after the payment data is removed and not published or used in any nefarious ways? A: We can assure you, downloaded data will be securely removed using DoD 5220.22-M wiping standart. We are not interested in keeping this data as we do not gain any profit from it. This data is used only to leverage you to make a payment and nothing more. On the market the data itself are relatively useless and cheap. Also we perfectly understand that using or publishing this data after the payment will compromise our reliable business operations and we are not interested in it. ==== ==== Q: How did you get into the network? A: Detailed report on how we did it and how to fix your vulnerabilities can be provided by request after the payment. ==== -------------------------------------------------------------------------------------- This is techinal information we need to identify you correctly and give decryption key to you, do not redact! ---SEKHMET--- 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 ---SEKHMET---
URLs

http://o3n4bhhtybbtwqqs.onion/B36B1ABBE151F36D

https://sekhmet.top/B36B1ABBE151F36D

Targets
Target

run.bat

MD5

8edbf5df7aebe871b491e0ec7e52038a

Filesize

131B

Score
10 /10
SHA1

f41b24074ed38cad1be394ff7cb5a7086c6b7fa1

SHA256

d4088bf2fe9e25800f51bc1176ae711a3f1038fedeb72d9c406ed963795a1f8f

SHA512

682ea13ef588627b5d3955cab498b21390031b1042fab0532d4273c78564a957641f3f303e8b42a6b90472483eb49ed5dc0bf1aac58b910d51d0b7f4b0c1ff0b

Tags

Signatures

  • Sekhmet Ransomware

    Description

    Ransomware family active in the wild since early 2020.

    Tags

  • Modifies extensions of user files

    Description

    Ransomware generally changes the extension on encrypted files.

    Tags

  • Drops startup file

  • Reads user/profile data of web browsers

    Description

    Infostealers often target stored browser data, which can include saved credentials etc.

    Tags

    TTPs

    Data from Local System Credentials in Files
  • Modifies service

    Tags

    TTPs

    Modify Registry Modify Existing Service

Related Tasks

MITRE ATT&CK Matrix
Command and Control
    Credential Access
    Defense Evasion
    Discovery
      Execution
        Exfiltration
          Impact
            Initial Access
              Lateral Movement
                Privilege Escalation
                  Tasks

                  static1