General

  • Target

    a906d1810e76ee2a99e33800eef7b2f570852ec06d9bd8cfe4efb7e141334117

  • Size

    65KB

  • Sample

    210511-dr4fz1yj96

  • MD5

    7fd2d168d122ef3ce5f6290eeede293d

  • SHA1

    714947ebce3dcfd5a77fe5949744e5095f04b497

  • SHA256

    a906d1810e76ee2a99e33800eef7b2f570852ec06d9bd8cfe4efb7e141334117

  • SHA512

    73294aadca19f044011c307d55a8166616e5fd7ee6a2a485faf64b36301684e250797a6cf7503192960854fde2cb78547374dd57c6eda4fc8ff1fc78fb725171

Malware Config

Extracted

Path

C:\Windows\TEMP\RESTORE_FILES_INFO.txt

Ransom Note
YOUR COMPANY NETWORK HAS BEEN HACKED All your important files have been encrypted! Your files are safe! Only modified.(AES) No software available on internet can help you. We are the only ones able to decrypt your files. -------------------------------------------------------------------------------- We also gathered highly confidential/personal data. These data are currently stored on a private server. Files are also encrypted and stored securely. -------------------------------------------------------------------------------- As a result of working with us, you will receive: Fully automatic decryptor, all your data will be recovered within a few hours after it's run. Server with your data will be immediately destroyed after your payment. Save time and continue working. You will can send us 2-3 non-important files and we will decrypt it for free to prove we are able to give your files back. -------------------------------------------------------------------------------- !!!!!!!!!!!!!!!!!!!!!!!! If you decide not to work with us: All data on your computers will remain encrypted forever. YOUR DATA ON OUR SERVER AND WE WILL RELEASE YOUR DATA TO PUBLIC OR RE-SELLER! So you can expect your data to be publicly available in the near future.. The price will increase over time. !!!!!!!!!!!!!!!!!!!!!!!!! -------------------------------------------------------------------------------- It doesn't matter to us what you choose pay us or we will sell your data. We only seek money and our goal is not to damage your reputation or prevent your business from running. Write to us now and we will provide the best prices. Instructions for contacting us: ____________________________________________________________________________________ You have two ways: 1) [Recommended] Using a TOR browser! a. Download and install TOR browser from this site: https://torproject.org/ b. Open the Tor browser. Copy the link: http://promethw27cbrcot.onion/ticket.php?track=141-5D9-Y454 and paste it in the Tor browser. c. Start a chat and follow the further instructions. 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a. Open your any browser (Chrome, Firefox, Opera, IE, Edge) b. Open our secondary website: http://prometheusdec.in/ticket.php?track=141-5D9-Y454 c. Start a chat and follow the further instructions. Warning: secondary website can be blocked, thats why first variant much better and more available. _____________________________________________________________________________________ Attention! Any attempt to restore your files with third-party software will corrupt it. Modify or rename files will result in a loose of data. If you decide to try anyway, make copies before that Key Identifier: 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
URLs

http://promethw27cbrcot.onion/ticket.php?track=141-5D9-Y454

http://prometheusdec.in/ticket.php?track=141-5D9-Y454

Targets

    • Target

      a906d1810e76ee2a99e33800eef7b2f570852ec06d9bd8cfe4efb7e141334117

    • Size

      65KB

    • MD5

      7fd2d168d122ef3ce5f6290eeede293d

    • SHA1

      714947ebce3dcfd5a77fe5949744e5095f04b497

    • SHA256

      a906d1810e76ee2a99e33800eef7b2f570852ec06d9bd8cfe4efb7e141334117

    • SHA512

      73294aadca19f044011c307d55a8166616e5fd7ee6a2a485faf64b36301684e250797a6cf7503192960854fde2cb78547374dd57c6eda4fc8ff1fc78fb725171

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Defense Evasion

Modify Registry

2
T1112

Discovery

Remote System Discovery

1
T1018

Tasks