General

  • Target

    ba15c27f26265f4b063b65654e9d7c248d0d651919fafb68cb4765d1e057f93f.sample

  • Size

    1.2MB

  • Sample

    210726-7jwmkmw4sj

  • MD5

    3b200c8173a92c94441cb062d38012f6

  • SHA1

    eb3eaaef52eafece1b91ced557e2071f1362f226

  • SHA256

    ba15c27f26265f4b063b65654e9d7c248d0d651919fafb68cb4765d1e057f93f

  • SHA512

    a91b553454b2bb3730a0301582342bec24312a901f26b89546f09e5305b166e5cf73e5f6b7abd9bdc70b06aceb1048ee71b4ffd1da113692bbd3e550e4159216

Malware Config

Extracted

Path

C:\Users\Public\Desktop\README_LOCKED.txt

Ransom Note
Greetings! There was a significant flaw in the security system of your company. You should be thankful that the flaw was exploited by serious people and not some rookies. They would have damaged all of your data by mistake or for fun. Your files are encrypted with the strongest military algorithms RSA4096 and AES-256. Without our special decoder it is impossible to restore the data. Attempts to restore your data with third party software as Photorec, RannohDecryptor etc. will lead to irreversible destruction of your data. To confirm our honest intentions. Send us 2-3 different random files and you will get them decrypted. It can be from different computers on your network to be sure that our decoder decrypts everything. Sample files we unlock for free (files should not be related to any kind of backups). We exclusively have decryption software for your situation DO NOT RESET OR SHUTDOWN - files may be damaged. DO NOT RENAME the encrypted files. DO NOT MOVE the encrypted files. This may lead to the impossibility of recovery of the certain files. The payment has to be made in Bitcoins. The final price depends on how fast you contact us. As soon as we receive the payment you will get the decryption tool and instructions on how to improve your systems security To get information on the price of the decoder contact us at: SayanWalsworth96@protonmail.com RezawyreEdipi1998@o2.pl
Emails

SayanWalsworth96@protonmail.com

RezawyreEdipi1998@o2.pl

Targets

    • Target

      ba15c27f26265f4b063b65654e9d7c248d0d651919fafb68cb4765d1e057f93f.sample

    • Size

      1.2MB

    • MD5

      3b200c8173a92c94441cb062d38012f6

    • SHA1

      eb3eaaef52eafece1b91ced557e2071f1362f226

    • SHA256

      ba15c27f26265f4b063b65654e9d7c248d0d651919fafb68cb4765d1e057f93f

    • SHA512

      a91b553454b2bb3730a0301582342bec24312a901f26b89546f09e5305b166e5cf73e5f6b7abd9bdc70b06aceb1048ee71b4ffd1da113692bbd3e550e4159216

    • LockerGoga

      LockerGoga is a ransomware that is primarily used in targeted, disruptive attacks.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks