General

  • Target

    c2f2834b216ef788b6c0568d0267223c.zip

  • Size

    648KB

  • Sample

    210319-3wd4bxw5x2

  • MD5

    2a11b08bc5bf827d12a1242e6bba687d

  • SHA1

    32e9662c969373e6aa15cab7c899871e47a87960

  • SHA256

    1d6671093c87f2e76df8e243a8eba7c47e93a4dafe1d287450f198f3e2af40ee

  • SHA512

    03f203947b2652faba72e8e35041898c6967fa7a37520ae47f1bb1cdaa58632ca1289893fad33e273901f16e8d45c85319e90e1db529fc41d0d905c77d2ad6d1

Malware Config

Extracted

Path

C:\_readme.txt

Ransom Note
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-NuEqGxqRg2 Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: helpteam@mail.ch Reserve e-mail address to contact us: helpmanager@airmail.cc Your personal ID: 0288Widasdgy4HLd4Nu8hMhno9C8AEpO10FUGAYGVNmXbgsUt1
Emails

helpteam@mail.ch

helpmanager@airmail.cc

URLs

https://we.tl/t-NuEqGxqRg2

Targets

    • Target

      c2f2834b216ef788b6c0568d0267223c

    • Size

      713KB

    • MD5

      c2f2834b216ef788b6c0568d0267223c

    • SHA1

      77629d77891b0e995cbd577c7835d7465e5f8ff7

    • SHA256

      b055016e0d82c57b58cd126f26b4b8f4dae1441f0019bdaa42452e815f128944

    • SHA512

      7ccdb7dcb37a75b120655458eedfbf7057144d50c820e9acff72d018b613bee9a26263c4a1cd8b4d3a090c52ae66c7af0daa9bf4e39f5e3fc176f9f13b6b968a

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Modifies file permissions

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Permissions Modification

1
T1222

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

1
T1082

Tasks