General

  • Target

    5cfc6c6004f1192a75a211f4ddca5ce4c74a08fa92c4ef7f2fa17e530b889578

  • Size

    147KB

  • Sample

    210515-dya9nnw2tx

  • MD5

    c9826d38518e826964a7fc5b0e543ad1

  • SHA1

    157b2fde2e1ccf95fa2c5152d953b5d2d1c572fa

  • SHA256

    5cfc6c6004f1192a75a211f4ddca5ce4c74a08fa92c4ef7f2fa17e530b889578

  • SHA512

    ff3dc5b2c6737d8838a1bba8363f24b7069159669d7b759140324c49648d76a42b52cb52caf0b3790caa45284c656b6e3d256e0ea8f5662e93b9b8b9dbcedeac

Malware Config

Extracted

Path

C:\Users\Admin\YOUR_FILES_ARE_ENCRYPTED.TXT

Ransom Note
You became victim of the GOLDENEYE RANSOMWARE! The files on your computer have been encrypted with an military grade encryption algorithm. There is no way to restore your data without a special key. You can purchase this key on the darknet page shown in step 2. To purchase your key and restore your data, please follow these three easy steps: 1. Download the Tor Browser at "https://www.torproject.org/". If you need help, please google for "access onion page". 2. Visit one of the following pages with the Tor Browser: http://golden5a4eqranh7.onion/vTWEEiLQ http://goldeny4vs3nyoht.onion/vTWEEiLQ 3. Enter your personal decryption code there: vTWEEiLQpEzAFHAZULU5knwwsSddRvCAiBGisUtwxBiRyEGDh34MHn5VKy597H26TAHvK5sLnc7vqCnbTMD56TizN4SLHeDU
URLs

http://golden5a4eqranh7.onion/vTWEEiLQ

http://goldeny4vs3nyoht.onion/vTWEEiLQ

Extracted

Path

C:\Users\Admin\YOUR_FILES_ARE_ENCRYPTED.TXT

Ransom Note
You became victim of the GOLDENEYE RANSOMWARE! The files on your computer have been encrypted with an military grade encryption algorithm. There is no way to restore your data without a special key. You can purchase this key on the darknet page shown in step 2. To purchase your key and restore your data, please follow these three easy steps: 1. Download the Tor Browser at "https://www.torproject.org/". If you need help, please google for "access onion page". 2. Visit one of the following pages with the Tor Browser: http://golden5a4eqranh7.onion/uzvhha5h http://goldeny4vs3nyoht.onion/uzvhha5h 3. Enter your personal decryption code there: uzvhha5hjyTJuv7WbPi2rhCGGzM9FyQWMzC9bqziJYonexmRpvpB8UbZHAuVD68e8ayPJb2dxDEvZ4ABHyVbZj5XMd7KME2t
URLs

http://golden5a4eqranh7.onion/uzvhha5h

http://goldeny4vs3nyoht.onion/uzvhha5h

Targets

    • Target

      5cfc6c6004f1192a75a211f4ddca5ce4c74a08fa92c4ef7f2fa17e530b889578

    • Size

      147KB

    • MD5

      c9826d38518e826964a7fc5b0e543ad1

    • SHA1

      157b2fde2e1ccf95fa2c5152d953b5d2d1c572fa

    • SHA256

      5cfc6c6004f1192a75a211f4ddca5ce4c74a08fa92c4ef7f2fa17e530b889578

    • SHA512

      ff3dc5b2c6737d8838a1bba8363f24b7069159669d7b759140324c49648d76a42b52cb52caf0b3790caa45284c656b6e3d256e0ea8f5662e93b9b8b9dbcedeac

    • Seon

      The Seon Ransomware is an encryption ransomware Trojan first observed on November 14, 2018.

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks