Analysis

  • max time kernel
    11s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    16-05-2021 04:46

General

  • Target

    2b71bdf234f7031f5ddec877413081be39f01241595c4781798f850598b7965b.exe

  • Size

    80KB

  • MD5

    c6c826418defa98a9da4d42922f05ff5

  • SHA1

    56dfab44b3cbdb510a6c5c439466a18100456dc5

  • SHA256

    2b71bdf234f7031f5ddec877413081be39f01241595c4781798f850598b7965b

  • SHA512

    fda229805746c60dd38b3d9c8be2f2e0e4585bb5e585217660cfbbb5a5952581908e4031b34d3e47bebac2df951710274d1b4ada59474582961cb326281d5d60

Malware Config

Extracted

Path

C:\Users\Admin\YOUR_FILES_ARE_ENCRYPTED.TXT

Ransom Note
You became victim of the GOLDENEYE RANSOMWARE! The files on your computer have been encrypted with an military grade encryption algorithm. There is no way to restore your data without a special key. You can purchase this key on the darknet page shown in step 2. To purchase your key and restore your data, please follow these three easy steps: 1. Download the Tor Browser at "https://www.torproject.org/". If you need help, please google for "access onion page". 2. Visit one of the following pages with the Tor Browser: http://golden5a4eqranh7.onion/oczcz5Ex http://goldeny4vs3nyoht.onion/oczcz5Ex 3. Enter your personal decryption code there: oczcz5ExSzrUhDDRorNpemSrZXoTe2fUKqV8AU1xVuDnvnG2ZpmcURRDdsP19fNoLQYaUGSrjxq9HbkybKrWFd3icU9eMCKH
URLs

http://golden5a4eqranh7.onion/oczcz5Ex

http://goldeny4vs3nyoht.onion/oczcz5Ex

Signatures

  • Seon

    The Seon Ransomware is an encryption ransomware Trojan first observed on November 14, 2018.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2b71bdf234f7031f5ddec877413081be39f01241595c4781798f850598b7965b.exe
    "C:\Users\Admin\AppData\Local\Temp\2b71bdf234f7031f5ddec877413081be39f01241595c4781798f850598b7965b.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3988
    • C:\Users\Admin\AppData\Roaming\{7a6e0c85-60e4-4ab9-b507-4c4471231b4b}\dtdump.exe
      "C:\Users\Admin\AppData\Roaming\{7a6e0c85-60e4-4ab9-b507-4c4471231b4b}\dtdump.exe"
      2⤵
      • Executes dropped EXE
      PID:2848

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2848-120-0x00000000007B0000-0x00000000007C1000-memory.dmp

    Filesize

    68KB

  • memory/3988-114-0x00000000001E0000-0x00000000001EC000-memory.dmp

    Filesize

    48KB

  • memory/3988-115-0x00000000004C0000-0x000000000060A000-memory.dmp

    Filesize

    1.3MB