General

  • Target

    MsWord.exe

  • Size

    8.3MB

  • Sample

    210322-6se7sqsx6n

  • MD5

    de6717de7bd1daa595c0b00887c25f05

  • SHA1

    f70cc94796e6f89499a3958d7fd2001e50a984f0

  • SHA256

    95cfd76bfea8839d2c545cc10d1c94131868471d51ccb8a4525058f591f92b44

  • SHA512

    eca079d83bd0c0e57e64479dcaf4437c0029a13e1506d117a6f4a139439e4dfacc2b5271822d8b1fc08219bebee9f2c788284290f74aca3d0ac77184e804303b

Malware Config

Extracted

Path

\??\c:\README.txt

Ransom Note
Your files have been uploaded to our server and encrypted! They cannot be decrypted without our key, which was generated individually for your computer. The only thing you can do now is to buy a key and a decoder within 10 hours! If you do not, after 10 hours your private key will be deleted from our server, you will lose your encrypted files forever, and we will publish your files on the internet. Send 0.006 Bitcoin to the BTC address: bc1qhffuqkuwmenevjq6erfkfr043qv2dlgujq4h0g Then send the transaction ID and your ID to the following email address: [email protected] or [email protected] We respond to emails only after receiving the payment. After payment, we will send our decoder and decryption code to your computer within a few hours. You just need to run it and it will ensure that all the files are automatically decrypted (unless you have renamed or changed them)! Don't worry, if the conditions are met, all your data will be restored and deleted from our server. We have no reason to cheat you after payment. < < Where can I buy and send Bitcoins?> > The easiest way to buy Bitcoins is through the LocalBitcoins website. You need to register, click the "buy bitcoin" button and select the seller by payment method and price. https://localbitcoins.com/buy_bitcoins or https://bitcoin.org/en/buy https://buy.moonpay.io Here you will also find other places to buy bitcoins and a beginner leader: http://www.coindesk.com/information/how-can-i-buy-bitcoins/ ATTENTION! Antivirus software, third-party services, or any other person cannot decrypt your files, and attempts to change, rename, or move your files may damage them, and even we cannot recover them. YOUR ID:'as615t'0fd4b'4e0752c7bc016345674d8020c38d84c6'
Wallets

bc1qhffuqkuwmenevjq6erfkfr043qv2dlgujq4h0g

URLs

https://bitcoin.org/en/buy

https://buy.moonpay.io

Targets

    • Target

      MsWord.exe

    • Size

      8.3MB

    • MD5

      de6717de7bd1daa595c0b00887c25f05

    • SHA1

      f70cc94796e6f89499a3958d7fd2001e50a984f0

    • SHA256

      95cfd76bfea8839d2c545cc10d1c94131868471d51ccb8a4525058f591f92b44

    • SHA512

      eca079d83bd0c0e57e64479dcaf4437c0029a13e1506d117a6f4a139439e4dfacc2b5271822d8b1fc08219bebee9f2c788284290f74aca3d0ac77184e804303b

    • DemonWare

      Ransomware first seen in mid-2020.

    • Drops file in Drivers directory

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks