General

  • Target

    e_win.exe

  • Size

    75KB

  • Sample

    210313-n5neqfeab6

  • MD5

    a73d9dc904349b9c967dc6a724806b2d

  • SHA1

    e3e6dfd5e0c29acefe90471e46142c120278e9f0

  • SHA256

    9a089790e04683ebf37d9746e0284322f59c46eef2a86cc231839482f323e871

  • SHA512

    39f2fd0d8f7b63b78a33f44f89d5c01a6ec6c5c194d91d1a8280708e76a13aae0507893779d1e6545fbbdde74b224043e2dfa8b73b5cb4a3265978fdb7625f6d

Score
10/10

Malware Config

Extracted

Path

C:\How To Restore Your Files.txt

Ransom Note
############## [ babuk ransomware ] ############## * What happend? ---------------------------------------------- Your computers and servers are encrypted, backups are deleted from your network and copied. We use strong encryption algorithms, so you cannot decrypt your data without us. But you can restore everything by purchasing a special program from us - a universal decoder. This program will restore your entire network. Follow our instructions below and you will recover all your data. If you continue to ignore this for a long time, we will start reporting the hack to mainstream media and posting your data to the dark web. * What guarantees? ---------------------------------------------- We value our reputation. If we do not do our work and liabilities, nobody will pay us. This is not in our interests. All our decryption software is perfectly tested and will decrypt your data. We will also provide support in case of problems. We guarantee to decrypt one file for free. Go to the site and contact us. * What information compromised? ---------------------------------------------- We copied many data from your internal network, here are some proofs (private link): http://wavbeudogz6byhnardd2lkp2jafims3j7tj6k6qnywchn2csngvtffqd.onion/blog/a4c7531a5c7287d8b77d240e0ee1755d5b257fb1f9fabbf89989d96304ddff2b/ Screenshots: https://i.imgur.com/66Yz8gK.png https://i.imgur.com/udaME7G.png https://i.imgur.com/ExpwRFZ.png https://i.imgur.com/TmotQHx.png https://i.imgur.com/TmotQHx.png https://i.imgur.com/KyDqrjO.png https://i.imgur.com/ISCG6BB.png https://i.imgur.com/CKVnYd4.png https://i.imgur.com/Ga17uEy.png https://i.imgur.com/CFzkdY5.png https://i.imgur.com/aeArm5h.png https://i.imgur.com/sYkAv3o.png https://i.imgur.com/NbWcEBt.png https://i.imgur.com/Yo72lP5.png https://i.imgur.com/N1UTyCk.png https://i.imgur.com/0cDog0s.png For additional confirmations, please chat with us/ In cases of ignoring us, the information will be released to the public in blog http://wavbeudogz6byhnardd2lkp2jafims3j7tj6k6qnywchn2csngvtffqd.onion/ * How to contact us? ---------------------------------------------- 1) Download for browser: https://www.torproject.org/download/ 2) Open it 3) Follow this link in tor browser: http://tsu2dpiiv4zjzfyq73eibemit2qyrimbbb6lhpm6n5ihgallom5lhdyd.onion/f57e6bc503b702905293ce18001127863b953b9cf1194a0eca02f6c8aec6dae5 1. If you see small fella malicious .exe file never load it to virustotal.com or any other virus researching website. Otherwise the info about the hack is not a secret anymore. The fact that your company is under ransomware attack is already known by filthy predators data security agents who will post in their pity twitters the fresh known news “OMG ANOTHER RANSOMWARE NOW IT’S “Your company name LLC!!!!! We are all gonna die aaaaaa halp” 2. No any public announcements about the hack or data leakage. And do not applicate to law enforcement. If you commit this actions, more serious consequences can occur and you pay much more than a ransom amount. Law structures like GDPR in this case can oblige you to pay huge fine. 3. If you decide to hire the data recovery company, obligate them to do not inform anyone and any third party about details of the attack. We strongly do not recommend to cooperate with data recovery company, because they do absolutely nothing that you can do by yourself and take money for it. all communications with hackers could be conducted by your it department indipendently without any extra payments.
URLs

http://wavbeudogz6byhnardd2lkp2jafims3j7tj6k6qnywchn2csngvtffqd.onion/blog/a4c7531a5c7287d8b77d240e0ee1755d5b257fb1f9fabbf89989d96304ddff2b/

https://i.imgur.com/66Yz8gK.png

https://i.imgur.com/udaME7G.png

https://i.imgur.com/ExpwRFZ.png

https://i.imgur.com/TmotQHx.png

https://i.imgur.com/KyDqrjO.png

https://i.imgur.com/ISCG6BB.png

https://i.imgur.com/CKVnYd4.png

https://i.imgur.com/Ga17uEy.png

https://i.imgur.com/CFzkdY5.png

https://i.imgur.com/aeArm5h.png

https://i.imgur.com/sYkAv3o.png

https://i.imgur.com/NbWcEBt.png

https://i.imgur.com/Yo72lP5.png

https://i.imgur.com/N1UTyCk.png

https://i.imgur.com/0cDog0s.png

http://wavbeudogz6byhnardd2lkp2jafims3j7tj6k6qnywchn2csngvtffqd.onion/

http://tsu2dpiiv4zjzfyq73eibemit2qyrimbbb6lhpm6n5ihgallom5lhdyd.onion/f57e6bc503b702905293ce18001127863b953b9cf1194a0eca02f6c8aec6dae5

Targets

    • Target

      e_win.exe

    • Size

      75KB

    • MD5

      a73d9dc904349b9c967dc6a724806b2d

    • SHA1

      e3e6dfd5e0c29acefe90471e46142c120278e9f0

    • SHA256

      9a089790e04683ebf37d9746e0284322f59c46eef2a86cc231839482f323e871

    • SHA512

      39f2fd0d8f7b63b78a33f44f89d5c01a6ec6c5c194d91d1a8280708e76a13aae0507893779d1e6545fbbdde74b224043e2dfa8b73b5cb4a3265978fdb7625f6d

    Score
    10/10
    • Babuk Locker

      RaaS first seen in 2021 initially called Vasa Locker.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks