Analysis

  • max time kernel
    78s
  • max time network
    112s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    09-11-2020 20:17

General

  • Target

    63ad8faf3c2b306ccd8aa7874e24e7d48e0f6bbeeb37adab26c2efa1410022c4.exe

  • Size

    80KB

  • MD5

    bdc345b7bcecf485d2ee9f0011fd2fb3

  • SHA1

    b1610f94dc8235d939b4817c36e09a8ebc3a29dd

  • SHA256

    63ad8faf3c2b306ccd8aa7874e24e7d48e0f6bbeeb37adab26c2efa1410022c4

  • SHA512

    1d56a85688d6499512421b38ecca8167e31c0ec2bbfc812e6c742820690f7e608c45b6e7159c59b583f608a724f855a6481facda0846ccd7ee4acac446a83335

Malware Config

Extracted

Path

C:\odt\F2782A-Readme.txt

Family

netwalker

Ransom Note
Hi! Your files are encrypted by Netwalker. All encrypted files for this computer has extension: .f2782a -- If for some reason you read this text before the encryption ended, this can be understood by the fact that the computer slows down, and your heart rate has increased due to the ability to turn it off, then we recommend that you move away from the computer and accept that you have been compromised. Rebooting/shutdown will cause you to lose files without the possibility of recovery. -- Our encryption algorithms are very strong and your files are very well protected, the only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypter program, you may damage them and then they will be impossible to recover. For us this is just business and to prove to you our seriousness, we will decrypt you one file for free. Just open our website, upload the encrypted file and get the decrypted file for free. -- Steps to get access on our website: 1.Download and install tor-browser: https://torproject.org/ 2.Open our website: pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion If the website is not available, open another one: rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion 3.Put your personal code in the input form: {code_f2782a: WZt4RorK8/9yE2pWT0/Du9Jis1BmWJX91u7fGcCm9bZ+N9MXzQ HfMgRB35pUSC9sLdki08cUauPhHGSgDi6oUe+FFuMe4Bt065Yy i5Vh7fuvesR9UO+UHwI3NZK6/qF2+FTNoK/bfY+bbzZT/5E9RY i5QpaGSLORUPQT1kl9g50OoZdp1jHZw1GFjgjUNq0DfsI+FPDA zQ7yLqN77i8u/4rkOP4l9ehwSy7+879vLUcWm5q4bx2tzN4lBt Er6w5ujRr1kPBmGKpsXWo+WZ/Ctb862rk1gv8zgw==}
URLs

http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion

http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion

Extracted

Path

C:\Users\Admin\Documents\F2782A-Readme.txt

Family

netwalker

Ransom Note
Hi! Your files are encrypted by Netwalker. All encrypted files for this computer has extension: .f2782a -- If for some reason you read this text before the encryption ended, this can be understood by the fact that the computer slows down, and your heart rate has increased due to the ability to turn it off, then we recommend that you move away from the computer and accept that you have been compromised. Rebooting/shutdown will cause you to lose files without the possibility of recovery. -- Our encryption algorithms are very strong and your files are very well protected, the only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypter program, you may damage them and then they will be impossible to recover. For us this is just business and to prove to you our seriousness, we will decrypt you one file for free. Just open our website, upload the encrypted file and get the decrypted file for free. -- Steps to get access on our website: 1.Download and install tor-browser: https://torproject.org/ 2.Open our website: pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion If the website is not available, open another one: rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion 3.Put your personal code in the input form: {code_f2782a: WZt4RorK8/9yE2pWT0/Du9Jis1BmWJX91u7fGcCm9bZ+N9MXzQ HfMgRB35pUSC9sLdki08cUauPhHGSgDi6oUe+FFuMe4Bt065Yy i5Vh7fuvesR9UO+UHwI3NZK6/qF2+FTNoK/bfY+bbzZT/5E9RY i5QpaGSLORUPQT1kl9g50OoZdp1jHZw1GFjgjUNq0DfsI+FPDA zQ7yLqN77i8u/4rkOP4l9ehwSy7+879vLUcWm5q4bx2tzN4lBt Er6w5ujRr1kPBmGKpsXWo+WZ/Ctb862rk1gv8zgw==}Hi! Your files are encrypted by Netwalker. All encrypted files for this computer has extension: .f2782a -- If for some reason you read this text before the encryption ended, this can be understood by the fact that the computer slows down, and your heart rate has increased due to the ability to turn it off, then we recommend that you move away from the computer and accept that you have been compromised. Rebooting/shutdown will cause you to lose files without the possibility of recovery. -- Our encryption algorithms are very strong and your files are very well protected, the only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypter program, you may damage them and then they will be impossible to recover. For us this is just business and to prove to you our seriousness, we will decrypt you one file for free. Just open our website, upload the encrypted file and get the decrypted file for free. -- Steps to get access on our website: 1.Download and install tor-browser: https://torproject.org/ 2.Open our website: pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion If the website is not available, open another one: rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion 3.Put your personal code in the input form: {code_f2782a: WZt4RorK8/9yE2pWT0/Du9Jis1BmWJX91u7fGcCm9bZ+N9MXzQ HfMgRB35pUSC9sLdki08cUauPhHGSgDi6oUe+FFuMe4Bt065Yy i5Vh7fuvesR9UO+UHwI3NZK6/qF2+FTNoK/bfY+bbzZT/5E9RY i5QpaGSLORUPQT1kl9g50OoZdp1jHZw1GFjgjUNq0DfsI+FPDA zQ7yLqN77i8u/4rkOP4l9ehwSy7+879vLUcWm5q4bx2tzN4lBt Er6w5ujRr1kPBmGKpsXWo+WZ/Ctb862rk1gv8zgw==}Hi! Your files are encrypted by Netwalker. All encrypted files for this computer has extension: .f2782a -- If for some reason you read this text before the encryption ended, this can be understood by the fact that the computer slows down, and your heart rate has increased due to the ability to turn it off, then we recommend that you move away from the computer and accept that you have been compromised. Rebooting/shutdown will cause you to lose files without the possibility of recovery. -- Our encryption algorithms are very strong and your files are very well protected, the only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypter program, you may damage them and then they will be impossible to recover. For us this is just business and to prove to you our seriousness, we will decrypt you one file for free. Just open our website, upload the encrypted file and get the decrypted file for free. -- Steps to get access on our website: 1.Download and install tor-browser: https://torproject.org/ 2.Open our website: pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion If the website is not available, open another one: rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion 3.Put your personal code in the input form: {code_f2782a: WZt4RorK8/9yE2pWT0/Du9Jis1BmWJX91u7fGcCm9bZ+N9MXzQ HfMgRB35pUSC9sLdki08cUauPhHGSgDi6oUe+FFuMe4Bt065Yy i5Vh7fuvesR9UO+UHwI3NZK6/qF2+FTNoK/bfY+bbzZT/5E9RY i5QpaGSLORUPQT1kl9g50OoZdp1jHZw1GFjgjUNq0DfsI+FPDA zQ7yLqN77i8u/4rkOP4l9ehwSy7+879vLUcWm5q4bx2tzN4lBt Er6w5ujRr1kPBmGKpsXWo+WZ/Ctb862rk1gv8zgw==}Hi! Your files are encrypted by Netwalker. All encrypted files for this computer has extension: .f2782a -- If for some reason you read this text before the encryption ended, this can be understood by the fact that the computer slows down, and your heart rate has increased due to the ability to turn it off, then we recommend that you move away from the computer and accept that you have been compromised. Rebooting/shutdown will cause you to lose files without the possibility of recovery. -- Our encryption algorithms are very strong and your files are very well protected, the only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypter program, you may damage them and then they will be impossible to recover. For us this is just business and to prove to you our seriousness, we will decrypt you one file for free. Just open our website, upload the encrypted file and get the decrypted file for free. -- Steps to get access on our website: 1.Download and install tor-browser: https://torproject.org/ 2.Open our website: pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion If the website is not available, open another one: rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion 3.Put your personal code in the input form: {code_f2782a: WZt4RorK8/9yE2pWT0/Du9Jis1BmWJX91u7fGcCm9bZ+N9MXzQ HfMgRB35pUSC9sLdki08cUauPhHGSgDi6oUe+FFuMe4Bt065Yy i5Vh7fuvesR9UO+UHwI3NZK6/qF2+FTNoK/bfY+bbzZT/5E9RY i5QpaGSLORUPQT1kl9g50OoZdp1jHZw1GFjgjUNq0DfsI+FPDA zQ7yLqN77i8u/4rkOP4l9ehwSy7+879vLUcWm5q4bx2tzN4lBt Er6w5ujRr1kPBmGKpsXWo+WZ/Ctb862rk1gv8zgw==}
URLs

http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion

http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion

Extracted

Path

C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\F2782A-Readme.txt

Family

netwalker

Ransom Note
Hi! Your files are encrypted by Netwalker. All encrypted files for this computer has extension: .f2782a -- If for some reason you read this text before the encryption ended, this can be understood by the fact that the computer slows down, and your heart rate has increased due to the ability to turn it off, then we recommend that you move away from the computer and accept that you have been compromised. Rebooting/shutdown will cause you to lose files without the possibility of recovery. -- Our encryption algorithms are very strong and your files are very well protected, the only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypter program, you may damage them and then they will be impossible to recover. For us this is just business and to prove to you our seriousness, we will decrypt you one file for free. Just open our website, upload the encrypted file and get the decrypted file for free. -- Steps to get access on our website: 1.Download and install tor-browser: https://torproject.org/ 2.Open our website: pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion If the website is not available, open another one: rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion 3.Put your personal code in the input form: {code_f2782a: WZt4RorK8/9yE2pWT0/Du9Jis1BmWJX91u7fGcCm9bZ+N9MXzQ HfMgRB35pUSC9sLdki08cUauPhHGSgDi6oUe+FFuMe4Bt065Yy i5Vh7fuvesR9UO+UHwI3NZK6/qF2+FTNoK/bfY+bbzZT/5E9RY i5QpaGSLORUPQT1kl9g50OoZdp1jHZw1GFjgjUNq0DfsI+FPDA zQ7yLqN77i8u/4rkOP4l9ehwSy7+879vLUcWm5q4bx2tzN4lBt Er6w5ujRr1kPBmGKpsXWo+WZ/Ctb862rk1gv8zgw==}Hi! Your files are encrypted by Netwalker. All encrypted files for this computer has extension: .f2782a -- If for some reason you read this text before the encryption ended, this can be understood by the fact that the computer slows down, and your heart rate has increased due to the ability to turn it off, then we recommend that you move away from the computer and accept that you have been compromised. Rebooting/shutdown will cause you to lose files without the possibility of recovery. -- Our encryption algorithms are very strong and your files are very well protected, the only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypter program, you may damage them and then they will be impossible to recover. For us this is just business and to prove to you our seriousness, we will decrypt you one file for free. Just open our website, upload the encrypted file and get the decrypted file for free. -- Steps to get access on our website: 1.Download and install tor-browser: https://torproject.org/ 2.Open our website: pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion If the website is not available, open another one: rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion 3.Put your personal code in the input form: {code_f2782a: WZt4RorK8/9yE2pWT0/Du9Jis1BmWJX91u7fGcCm9bZ+N9MXzQ HfMgRB35pUSC9sLdki08cUauPhHGSgDi6oUe+FFuMe4Bt065Yy i5Vh7fuvesR9UO+UHwI3NZK6/qF2+FTNoK/bfY+bbzZT/5E9RY i5QpaGSLORUPQT1kl9g50OoZdp1jHZw1GFjgjUNq0DfsI+FPDA zQ7yLqN77i8u/4rkOP4l9ehwSy7+879vLUcWm5q4bx2tzN4lBt Er6w5ujRr1kPBmGKpsXWo+WZ/Ctb862rk1gv8zgw==}
URLs

http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion

http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion

Extracted

Path

C:\Users\Admin\AppData\Local\TileDataLayer\Database\F2782A-Readme.txt

Family

netwalker

Ransom Note
Hi! Your files are encrypted by Netwalker. All encrypted files for this computer has extension: .f2782a -- If for some reason you read this text before the encryption ended, this can be understood by the fact that the computer slows down, and your heart rate has increased due to the ability to turn it off, then we recommend that you move away from the computer and accept that you have been compromised. Rebooting/shutdown will cause you to lose files without the possibility of recovery. -- Our encryption algorithms are very strong and your files are very well protected, the only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypter program, you may damage them and then they will be impossible to recover. For us this is just business and to prove to you our seriousness, we will decrypt you one file for free. Just open our website, upload the encrypted file and get the decrypted file for free. -- Steps to get access on our website: 1.Download and install tor-browser: https://torproject.org/ 2.Open our website: pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion If the website is not available, open another one: rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion 3.Put your personal code in the input form: {code_f2782a: WZt4RorK8/9yE2pWT0/Du9Jis1BmWJX91u7fGcCm9bZ+N9MXzQ HfMgRB35pUSC9sLdki08cUauPhHGSgDi6oUe+FFuMe4Bt065Yy i5Vh7fuvesR9UO+UHwI3NZK6/qF2+FTNoK/bfY+bbzZT/5E9RY i5QpaGSLORUPQT1kl9g50OoZdp1jHZw1GFjgjUNq0DfsI+FPDA zQ7yLqN77i8u/4rkOP4l9ehwSy7+879vLUcWm5q4bx2tzN4lBt Er6w5ujRr1kPBmGKpsXWo+WZ/Ctb862rk1gv8zgw==}Hi! Your files are encrypted by Netwalker. All encrypted files for this computer has extension: .f2782a -- If for some reason you read this text before the encryption ended, this can be understood by the fact that the computer slows down, and your heart rate has increased due to the ability to turn it off, then we recommend that you move away from the computer and accept that you have been compromised. Rebooting/shutdown will cause you to lose files without the possibility of recovery. -- Our encryption algorithms are very strong and your files are very well protected, the only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypter program, you may damage them and then they will be impossible to recover. For us this is just business and to prove to you our seriousness, we will decrypt you one file for free. Just open our website, upload the encrypted file and get the decrypted file for free. -- Steps to get access on our website: 1.Download and install tor-browser: https://torproject.org/ 2.Open our website: pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion If the website is not available, open another one: rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion 3.Put your personal code in the input form: {code_f2782a: WZt4RorK8/9yE2pWT0/Du9Jis1BmWJX91u7fGcCm9bZ+N9MXzQ HfMgRB35pUSC9sLdki08cUauPhHGSgDi6oUe+FFuMe4Bt065Yy i5Vh7fuvesR9UO+UHwI3NZK6/qF2+FTNoK/bfY+bbzZT/5E9RY i5QpaGSLORUPQT1kl9g50OoZdp1jHZw1GFjgjUNq0DfsI+FPDA zQ7yLqN77i8u/4rkOP4l9ehwSy7+879vLUcWm5q4bx2tzN4lBt Er6w5ujRr1kPBmGKpsXWo+WZ/Ctb862rk1gv8zgw==}Hi! Your files are encrypted by Netwalker. All encrypted files for this computer has extension: .f2782a -- If for some reason you read this text before the encryption ended, this can be understood by the fact that the computer slows down, and your heart rate has increased due to the ability to turn it off, then we recommend that you move away from the computer and accept that you have been compromised. Rebooting/shutdown will cause you to lose files without the possibility of recovery. -- Our encryption algorithms are very strong and your files are very well protected, the only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypter program, you may damage them and then they will be impossible to recover. For us this is just business and to prove to you our seriousness, we will decrypt you one file for free. Just open our website, upload the encrypted file and get the decrypted file for free. -- Steps to get access on our website: 1.Download and install tor-browser: https://torproject.org/ 2.Open our website: pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion If the website is not available, open another one: rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion 3.Put your personal code in the input form: {code_f2782a: WZt4RorK8/9yE2pWT0/Du9Jis1BmWJX91u7fGcCm9bZ+N9MXzQ HfMgRB35pUSC9sLdki08cUauPhHGSgDi6oUe+FFuMe4Bt065Yy i5Vh7fuvesR9UO+UHwI3NZK6/qF2+FTNoK/bfY+bbzZT/5E9RY i5QpaGSLORUPQT1kl9g50OoZdp1jHZw1GFjgjUNq0DfsI+FPDA zQ7yLqN77i8u/4rkOP4l9ehwSy7+879vLUcWm5q4bx2tzN4lBt Er6w5ujRr1kPBmGKpsXWo+WZ/Ctb862rk1gv8zgw==}
URLs

http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion

http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion

Extracted

Path

C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\F2782A-Readme.txt

Family

netwalker

Ransom Note
Hi! Your files are encrypted by Netwalker. All encrypted files for this computer has extension: .f2782a -- If for some reason you read this text before the encryption ended, this can be understood by the fact that the computer slows down, and your heart rate has increased due to the ability to turn it off, then we recommend that you move away from the computer and accept that you have been compromised. Rebooting/shutdown will cause you to lose files without the possibility of recovery. -- Our encryption algorithms are very strong and your files are very well protected, the only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypter program, you may damage them and then they will be impossible to recover. For us this is just business and to prove to you our seriousness, we will decrypt you one file for free. Just open our website, upload the encrypted file and get the decrypted file for free. -- Steps to get access on our website: 1.Download and install tor-browser: https://torproject.org/ 2.Open our website: pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion If the website is not available, open another one: rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion 3.Put your personal code in the input form: {code_f2782a: WZt4RorK8/9yE2pWT0/Du9Jis1BmWJX91u7fGcCm9bZ+N9MXzQ HfMgRB35pUSC9sLdki08cUauPhHGSgDi6oUe+FFuMe4Bt065Yy i5Vh7fuvesR9UO+UHwI3NZK6/qF2+FTNoK/bfY+bbzZT/5E9RY i5QpaGSLORUPQT1kl9g50OoZdp1jHZw1GFjgjUNq0DfsI+FPDA zQ7yLqN77i8u/4rkOP4l9ehwSy7+879vLUcWm5q4bx2tzN4lBt Er6w5ujRr1kPBmGKpsXWo+WZ/Ctb862rk1gv8zgw==}Hi! Your files are encrypted by Netwalker. All encrypted files for this computer has extension: .f2782a -- If for some reason you read this text before the encryption ended, this can be understood by the fact that the computer slows down, and your heart rate has increased due to the ability to turn it off, then we recommend that you move away from the computer and accept that you have been compromised. Rebooting/shutdown will cause you to lose files without the possibility of recovery. -- Our encryption algorithms are very strong and your files are very well protected, the only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypter program, you may damage them and then they will be impossible to recover. For us this is just business and to prove to you our seriousness, we will decrypt you one file for free. Just open our website, upload the encrypted file and get the decrypted file for free. -- Steps to get access on our website: 1.Download and install tor-browser: https://torproject.org/ 2.Open our website: pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion If the website is not available, open another one: rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion 3.Put your personal code in the input form: {code_f2782a: WZt4RorK8/9yE2pWT0/Du9Jis1BmWJX91u7fGcCm9bZ+N9MXzQ HfMgRB35pUSC9sLdki08cUauPhHGSgDi6oUe+FFuMe4Bt065Yy i5Vh7fuvesR9UO+UHwI3NZK6/qF2+FTNoK/bfY+bbzZT/5E9RY i5QpaGSLORUPQT1kl9g50OoZdp1jHZw1GFjgjUNq0DfsI+FPDA zQ7yLqN77i8u/4rkOP4l9ehwSy7+879vLUcWm5q4bx2tzN4lBt Er6w5ujRr1kPBmGKpsXWo+WZ/Ctb862rk1gv8zgw==}Hi! Your files are encrypted by Netwalker. All encrypted files for this computer has extension: .f2782a -- If for some reason you read this text before the encryption ended, this can be understood by the fact that the computer slows down, and your heart rate has increased due to the ability to turn it off, then we recommend that you move away from the computer and accept that you have been compromised. Rebooting/shutdown will cause you to lose files without the possibility of recovery. -- Our encryption algorithms are very strong and your files are very well protected, the only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypter program, you may damage them and then they will be impossible to recover. For us this is just business and to prove to you our seriousness, we will decrypt you one file for free. Just open our website, upload the encrypted file and get the decrypted file for free. -- Steps to get access on our website: 1.Download and install tor-browser: https://torproject.org/ 2.Open our website: pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion If the website is not available, open another one: rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion 3.Put your personal code in the input form: {code_f2782a: WZt4RorK8/9yE2pWT0/Du9Jis1BmWJX91u7fGcCm9bZ+N9MXzQ HfMgRB35pUSC9sLdki08cUauPhHGSgDi6oUe+FFuMe4Bt065Yy i5Vh7fuvesR9UO+UHwI3NZK6/qF2+FTNoK/bfY+bbzZT/5E9RY i5QpaGSLORUPQT1kl9g50OoZdp1jHZw1GFjgjUNq0DfsI+FPDA zQ7yLqN77i8u/4rkOP4l9ehwSy7+879vLUcWm5q4bx2tzN4lBt Er6w5ujRr1kPBmGKpsXWo+WZ/Ctb862rk1gv8zgw==}Hi! Your files are encrypted by Netwalker. All encrypted files for this computer has extension: .f2782a -- If for some reason you read this text before the encryption ended, this can be understood by the fact that the computer slows down, and your heart rate has increased due to the ability to turn it off, then we recommend that you move away from the computer and accept that you have been compromised. Rebooting/shutdown will cause you to lose files without the possibility of recovery. -- Our encryption algorithms are very strong and your files are very well protected, the only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypter program, you may damage them and then they will be impossible to recover. For us this is just business and to prove to you our seriousness, we will decrypt you one file for free. Just open our website, upload the encrypted file and get the decrypted file for free. -- Steps to get access on our website: 1.Download and install tor-browser: https://torproject.org/ 2.Open our website: pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion If the website is not available, open another one: rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion 3.Put your personal code in the input form: {code_f2782a: WZt4RorK8/9yE2pWT0/Du9Jis1BmWJX91u7fGcCm9bZ+N9MXzQ HfMgRB35pUSC9sLdki08cUauPhHGSgDi6oUe+FFuMe4Bt065Yy i5Vh7fuvesR9UO+UHwI3NZK6/qF2+FTNoK/bfY+bbzZT/5E9RY i5QpaGSLORUPQT1kl9g50OoZdp1jHZw1GFjgjUNq0DfsI+FPDA zQ7yLqN77i8u/4rkOP4l9ehwSy7+879vLUcWm5q4bx2tzN4lBt Er6w5ujRr1kPBmGKpsXWo+WZ/Ctb862rk1gv8zgw==}Hi! Your files are encrypted by Netwalker. All encrypted files for this computer has extension: .f2782a -- If for some reason you read this text before the encryption ended, this can be understood by the fact that the computer slows down, and your heart rate has increased due to the ability to turn it off, then we recommend that you move away from the computer and accept that you have been compromised. Rebooting/shutdown will cause you to lose files without the possibility of recovery. -- Our encryption algorithms are very strong and your files are very well protected, the only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypter program, you may damage them and then they will be impossible to recover. For us this is just business and to prove to you our seriousness, we will decrypt you one file for free. Just open our website, upload the encrypted file and get the decrypted file for free. -- Steps to get access on our website: 1.Download and install tor-browser: https://torproject.org/ 2.Open our website: pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion If the website is not available, open another one: rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion 3.Put your personal code in the input form: {code_f2782a: WZt4RorK8/9yE2pWT0/Du9Jis1BmWJX91u7fGcCm9bZ+N9MXzQ HfMgRB35pUSC9sLdki08cUauPhHGSgDi6oUe+FFuMe4Bt065Yy i5Vh7fuvesR9UO+UHwI3NZK6/qF2+FTNoK/bfY+bbzZT/5E9RY i5QpaGSLORUPQT1kl9g50OoZdp1jHZw1GFjgjUNq0DfsI+FPDA zQ7yLqN77i8u/4rkOP4l9ehwSy7+879vLUcWm5q4bx2tzN4lBt Er6w5ujRr1kPBmGKpsXWo+WZ/Ctb862rk1gv8zgw==}
URLs

http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion

http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion

Signatures

  • Netwalker Ransomware

    Ransomware family with multiple versions. Also known as MailTo.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies extensions of user files 7 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Modifies service 2 TTPs 5 IoCs
  • Drops file in Program Files directory 17177 IoCs
  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 17316 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\63ad8faf3c2b306ccd8aa7874e24e7d48e0f6bbeeb37adab26c2efa1410022c4.exe
    "C:\Users\Admin\AppData\Local\Temp\63ad8faf3c2b306ccd8aa7874e24e7d48e0f6bbeeb37adab26c2efa1410022c4.exe"
    1⤵
    • Modifies extensions of user files
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:756
    • C:\Windows\system32\vssadmin.exe
      C:\Windows\system32\vssadmin.exe delete shadows /all /quiet
      2⤵
      • Interacts with shadow copies
      PID:1796
    • C:\Windows\SysWOW64\notepad.exe
      C:\Windows\system32\notepad.exe "C:\Users\Admin\Desktop\F2782A-Readme.txt"
      2⤵
        PID:7488
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6BCA.tmp.bat"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1100
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /PID 756
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:9296
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Modifies service
      • Suspicious use of AdjustPrivilegeToken
      PID:5744

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Defense Evasion

    File Deletion

    2
    T1107

    Modify Registry

    1
    T1112

    Credential Access

    Credentials in Files

    1
    T1081

    Collection

    Data from Local System

    1
    T1005

    Impact

    Inhibit System Recovery

    2
    T1490

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\6BCA.tmp.bat
      MD5

      f10cca122413ecfc887a6281d53a641a

      SHA1

      030e036342bc457c10a4947b20e60ad7e71e63ed

      SHA256

      57b531fea8e416c6741af0b35b14c91eb1a2e39467972944ba4c1e7852d9ee8d

      SHA512

      83dd0bfc2e99923f4c28fea2bbee8a5876be7cba73e14008cb615731a6a4099a57f818aaab34aee370a5427683786e3596046ee62917bdc0fb10ded598c404f6

    • C:\Users\Admin\Desktop\F2782A-Readme.txt
      MD5

      65dba1138b6b6a3a7425478db6790fc2

      SHA1

      6f019d6076d5aa7a7e268b30b3d47714c769c3e4

      SHA256

      5281f990f841e82b7fc6596e158c9f52c5027940d7e473c6c5e0eef0f1b2fae6

      SHA512

      5a11fecec8d4891ee1d148a84200f075d6c28ae882c6429b5401e8260d7305d95b5f472c0051c0ea798d251be0b8d381684531b2ccb7b86cdcca4aed47a45247

    • memory/1100-2-0x0000000000000000-mapping.dmp
    • memory/1796-0-0x0000000000000000-mapping.dmp
    • memory/7488-1-0x0000000000000000-mapping.dmp
    • memory/9296-4-0x0000000000000000-mapping.dmp