General

  • Target

    6670405041553408.zip

  • Size

    207KB

  • Sample

    210722-eddnlyg9kx

  • MD5

    33d6ddf4d74e7621b3e938a548072fa2

  • SHA1

    575c4cc2069fdac3175325e86cecb6e45fd3513d

  • SHA256

    3288972817811fd9b1c94019290cc1caff65160d5e88b6f90b605dacbe177df5

  • SHA512

    e73c9050ee8f2c9538ef549e040fa6099b1339a82d8ac347292b707e2db5fd1f623f1d79600ebda754ae01b48e5c46c59992c9dd9d7e1fdc27430efdf2327cc2

Score
10/10

Malware Config

Extracted

Path

C:\$Recycle.Bin\GET_YOUR_FILES_BACK.txt

Ransom Note
Attention! Your files have been encrypted using AES-256. We highly suggest not shutting down your computer in case encryption process is not finished, as your files may get corrupted. In order to decrypt your files, you must pay for the decryption key & application. You may do so by visiting us at http://avos2fuj6olp6x36.onion. This is an onion address that you may access using Tor Browser which you may download at https://www.torproject.org/download/ Details such as pricing, how long before the price increases and such will be available to you once you enter your ID presented to you below in this note in our website. Hurry up, as the price may increase in the following days. If you fail to respond in a swift manner, we will leak your files in our press release/blog website accessible at http://avos53nnmi4u6amh.onion/ Message from agent: We have exfiltrated confidential documents, passports scans, social security numbers and financial documents. All data will be leaked if you do not cooperate! Your ID: 168e11dcf2c8e477a570a445a82dec00ed1ae418a6722075b2986ccfd661f2d6
URLs

http://avos2fuj6olp6x36.onion

http://avos53nnmi4u6amh.onion/

Targets

    • Target

      43b7a60c0ef8b4af001f45a0c57410b7374b1d75a6811e0dfc86e4d60f503856

    • Size

      402KB

    • MD5

      d285f1366d0d4fdae0b558db690497ea

    • SHA1

      f6f94e2f49cd64a9590963ef3852e135e2b8deba

    • SHA256

      43b7a60c0ef8b4af001f45a0c57410b7374b1d75a6811e0dfc86e4d60f503856

    • SHA512

      0922a6698c9a63935289fed5f70eff7cd4603c113410e713bcff6039a70edd1b505af503fb0f9e19b21f56cacba1d774c9a51dc275be2a0d67477731c5cc2718

    Score
    10/10
    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

MITRE ATT&CK Matrix

Tasks