General

  • Target

    7bcd69b3085126f7e97406889f78ab74e87230c11812b79406d723a80c08dd26.sample

  • Size

    1.2MB

  • Sample

    210726-z91ar2nh9e

  • MD5

    7e3f8b6b7ac0565bfcbf0a1e3e6fcfbc

  • SHA1

    b2a701225c8c7f839be3c5009d52b4421063d93e

  • SHA256

    7bcd69b3085126f7e97406889f78ab74e87230c11812b79406d723a80c08dd26

  • SHA512

    20e47f1bce3635c43816c806e5ffdf349ed07c2dd65b5f4e025a3a1343121932f6537ecc7028d842775e9cbeef6ba8110dee8ce0b6dc25dc63772cd840d62e59

Malware Config

Extracted

Path

C:\Users\Public\Desktop\README_LOCKED.txt

Ransom Note
Greetings! There was a significant flaw in the security system of your company. You should be thankful that the flaw was exploited by serious people and not some rookies. They would have damaged all of your data by mistake or for fun. Your files are encrypted with the strongest military algorithms RSA4096 and AES-256. Without our special decoder it is impossible to restore the data. Attempts to restore your data with third party software as Photorec, RannohDecryptor etc. will lead to irreversible destruction of your data. To confirm our honest intentions. Send us 2-3 different random files and you will get them decrypted. It can be from different computers on your network to be sure that our decoder decrypts everything. Sample files we unlock for free (files should not be related to any kind of backups). We exclusively have decryption software for your situation DO NOT RESET OR SHUTDOWN - files may be damaged. DO NOT RENAME the encrypted files. DO NOT MOVE the encrypted files. This may lead to the impossibility of recovery of the certain files. The payment has to be made in Bitcoins. The final price depends on how fast you contact us. As soon as we receive the payment you will get the decryption tool and instructions on how to improve your systems security To get information on the price of the decoder contact us at: MayarChenot@protonmail.com QicifomuEjijika@o2.pl
Emails

MayarChenot@protonmail.com

QicifomuEjijika@o2.pl

Targets

    • Target

      7bcd69b3085126f7e97406889f78ab74e87230c11812b79406d723a80c08dd26.sample

    • Size

      1.2MB

    • MD5

      7e3f8b6b7ac0565bfcbf0a1e3e6fcfbc

    • SHA1

      b2a701225c8c7f839be3c5009d52b4421063d93e

    • SHA256

      7bcd69b3085126f7e97406889f78ab74e87230c11812b79406d723a80c08dd26

    • SHA512

      20e47f1bce3635c43816c806e5ffdf349ed07c2dd65b5f4e025a3a1343121932f6537ecc7028d842775e9cbeef6ba8110dee8ce0b6dc25dc63772cd840d62e59

    • LockerGoga

      LockerGoga is a ransomware that is primarily used in targeted, disruptive attacks.

    • Modifies Installed Components in the registry

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Tasks