General

  • Target

    ba8695d76cbb3b8b6ef1b6a40c8991f5ce2197af6a5c7ac10c08b5de91b56b6c

  • Size

    80KB

  • Sample

    210515-h9r9dd3asa

  • MD5

    bb346e1f39341855261b4b66a8536370

  • SHA1

    9b14ff82649e7e410deb715e3a440797ddd0bb99

  • SHA256

    ba8695d76cbb3b8b6ef1b6a40c8991f5ce2197af6a5c7ac10c08b5de91b56b6c

  • SHA512

    6328f5219e2a78a2d04a34ecde75e2423c158f3ae8aa9c6facf1ab3cab5d0409dfbebca783647f467c314c5c85b1c5a22740a6c8a2509ecad1611c1dc3e2e4f5

Malware Config

Extracted

Path

C:\Users\Admin\YOUR_FILES_ARE_ENCRYPTED.TXT

Ransom Note
You became victim of the GOLDENEYE RANSOMWARE! The files on your computer have been encrypted with an military grade encryption algorithm. There is no way to restore your data without a special key. You can purchase this key on the darknet page shown in step 2. To purchase your key and restore your data, please follow these three easy steps: 1. Download the Tor Browser at "https://www.torproject.org/". If you need help, please google for "access onion page". 2. Visit one of the following pages with the Tor Browser: http://golden5a4eqranh7.onion/qVgxyw9j http://goldeny4vs3nyoht.onion/qVgxyw9j 3. Enter your personal decryption code there: qVgxyw9jCCbjCvBhHvohvokuNNCSkYki9qvT8yGCuoEztDwPuX62omxsFRiEZdLJopYozwPbEFRsVpModCYKSfdiWCWPsDmw
URLs

http://golden5a4eqranh7.onion/qVgxyw9j

http://goldeny4vs3nyoht.onion/qVgxyw9j

Extracted

Path

C:\Users\Admin\YOUR_FILES_ARE_ENCRYPTED.TXT

Ransom Note
You became victim of the GOLDENEYE RANSOMWARE! The files on your computer have been encrypted with an military grade encryption algorithm. There is no way to restore your data without a special key. You can purchase this key on the darknet page shown in step 2. To purchase your key and restore your data, please follow these three easy steps: 1. Download the Tor Browser at "https://www.torproject.org/". If you need help, please google for "access onion page". 2. Visit one of the following pages with the Tor Browser: http://golden5a4eqranh7.onion/qNLb1Gxx http://goldeny4vs3nyoht.onion/qNLb1Gxx 3. Enter your personal decryption code there: qNLb1GxxfqesK1FMrfj7pp2gr9wNBvkg3dodxVfEq6rRor1a4aBdnXhp5CYdVHFKmi3unktpaoQ9WTQ52V72gMBWQAKk6yg5
URLs

http://golden5a4eqranh7.onion/qNLb1Gxx

http://goldeny4vs3nyoht.onion/qNLb1Gxx

Targets

    • Target

      ba8695d76cbb3b8b6ef1b6a40c8991f5ce2197af6a5c7ac10c08b5de91b56b6c

    • Size

      80KB

    • MD5

      bb346e1f39341855261b4b66a8536370

    • SHA1

      9b14ff82649e7e410deb715e3a440797ddd0bb99

    • SHA256

      ba8695d76cbb3b8b6ef1b6a40c8991f5ce2197af6a5c7ac10c08b5de91b56b6c

    • SHA512

      6328f5219e2a78a2d04a34ecde75e2423c158f3ae8aa9c6facf1ab3cab5d0409dfbebca783647f467c314c5c85b1c5a22740a6c8a2509ecad1611c1dc3e2e4f5

    • Seon

      The Seon Ransomware is an encryption ransomware Trojan first observed on November 14, 2018.

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks