General

  • Target

    lkx111.zip

  • Size

    173KB

  • Sample

    201117-44befkccnn

  • MD5

    f4b82b27ed76c327cab0e047b2f84a8d

  • SHA1

    38b325825a652170befceacf10c800c25249fe19

  • SHA256

    d00f95a2f98cc6e7cc8806bb6dfceeb97c3aba47fb3ce530e72e39a35e794e37

  • SHA512

    7349f01bef395c3484c1b7b79eb5ee1f5e1df5e25dd863602a49d7bcffd8a3b2e0a1954a7e8f5c9d8deeed0dc45fbc3c8df0237836c6c58db3fdceba3843ef9c

Malware Config

Extracted

Path

C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta

Ransom Note
YOUR FILES ARE ENCRYPTED Don't worry,you can return all your files! If you want to restore them, follow this link: email pexdatax@gmail.com YOUR ID If you have not been answered via the link within 12 hours,Tox - 1123AA3360A5AFB77D928C4CD99E9EF66EF28FCEEE1F840B93456FD9CE562B7F92204B0D8904 please download - https://tox.chat/download.html or http://pexdatax.com/ write to us by e-mail: pexdatax@gmail.com Attention! Do not rename encrypted files. Do not try to decrypt your data using third party software, it may cause permanent data loss. Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.
Emails

pexdatax@gmail.com

URLs

https://tox.chat/download.html

http://pexdatax.com/

Targets

    • Target

      lkx111.exe

    • Size

      358KB

    • MD5

      ce8e9e7376b8f0cd83a0330c2b3a77c1

    • SHA1

      fe98b50cca96ce2a2256d48dac65b9d0a3a74283

    • SHA256

      b0127f59eb38fd379e87dccace57c6c1f7922dd54b752b3c0f6f62b3358a763d

    • SHA512

      5f193ccffaa444bbf0ca543f01832e5dae3dbad105d9c52de58d9ee8edf10546c2f5625ab22c2eafe718f1c115b4925c423270c9b2de5f5a3d7cfbd018b08f24

    • Dharma

      Dharma is a ransomware that uses security software installation to hide malicious activities.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

    • Modifies service

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Modify Existing Service

1
T1031

Defense Evasion

File Deletion

2
T1107

Modify Registry

3
T1112

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Impact

Inhibit System Recovery

2
T1490

Tasks