General

  • Target

    4e6c191325b37da546e72f4a7334d820995d744bf7bb1a03605adb3ad30ce9ca.sample

  • Size

    17KB

  • Sample

    210726-yvsrjmhmbs

  • MD5

    16a29314e8563135b18668036a6f63c8

  • SHA1

    90cf5ca4df9d78cf92bb865b5b399a4d2752e55b

  • SHA256

    4e6c191325b37da546e72f4a7334d820995d744bf7bb1a03605adb3ad30ce9ca

  • SHA512

    45c023e6dd4202079e913b8946825b47fab30b584bbd79b0416152cc4a54975b12205393827289c1f03feb71b54d3b6b34490be3001e9b565c1f89e13e752032

Malware Config

Extracted

Path

C:\H0w_T0_Rec0very_Files.txt

Ransom Note
Your network have been penetrated and encrypted with a strong algorythm Backups were either removed or encrypted No one can help you to recover the network except us Do not share this link or email. Otherwise, we will have to delete the decryption keys To get your files back you have to pay the decryption fee in BTC. The price depends on the network size, number of employess and annual revenue. Download TOR-Browser: https://www.torproject.org/download/ Login ax3spapdymip4jpy.onion using your ID I1VF02 or contact our support by email help0f0ry0u@protonmail.com You'll receive instructions inside. You should get in contact with us within 2 days after you noticed the encryption to have a good discount. The decryption key will be stored for 1 month. The price will be increased by 100% in two weeks We also have gathered your sensitive data. We would share it in case you refuse to pay Do not rename or move encrypted files Decryption using third party software is impossible. Attempts to self-decrypting files will result in the loss of your data.
Emails

help0f0ry0u@protonmail.com

URLs

http://ax3spapdymip4jpy.onion

Targets

    • Target

      4e6c191325b37da546e72f4a7334d820995d744bf7bb1a03605adb3ad30ce9ca.sample

    • Size

      17KB

    • MD5

      16a29314e8563135b18668036a6f63c8

    • SHA1

      90cf5ca4df9d78cf92bb865b5b399a4d2752e55b

    • SHA256

      4e6c191325b37da546e72f4a7334d820995d744bf7bb1a03605adb3ad30ce9ca

    • SHA512

      45c023e6dd4202079e913b8946825b47fab30b584bbd79b0416152cc4a54975b12205393827289c1f03feb71b54d3b6b34490be3001e9b565c1f89e13e752032

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

File Deletion

2
T1107

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Collection

Data from Local System

1
T1005

Impact

Inhibit System Recovery

2
T1490

Tasks