General

  • Target

    09133f97793186542546f439e518554a5bb17117689c83bc3978cc532ae2f138.sample

  • Size

    3.7MB

  • Sample

    210726-zymwj9gaca

  • MD5

    d659325ea3491708820a2beffe9362b8

  • SHA1

    6e7f725401c33332beb2383a6802a7e4b2db30a9

  • SHA256

    09133f97793186542546f439e518554a5bb17117689c83bc3978cc532ae2f138

  • SHA512

    958f4a72530703131be2f25dc906ab7fc8ee174e9cbd13f9c976af7e986593b56a768e0413e6a85d06f2bdc057ac7d9617f6c25cbf8f13cc2f8348bcf441eeb5

Malware Config

Extracted

Path

C:\Users\Public\Desktop\Decrypt-Your-Files.txt

Ransom Note
-------------------------------------------- | What happened to your files? -------------------------------------------- We breached your corporate network and encrypted the data on your computers. The encrypted data includes documents, databases, photos and more - all were encrypted using a military grade encryption algorithms (AES-256 and RSA-2048). You cannot access those files right now. But dont worry! You can still get those files back and be up and running again in no time. --------------------------------------------- | How to contact us to get your files back? --------------------------------------------- The only way to restore your files is by purchasing a decryption tool loaded with a private key we created specifically for your network. Once run on an effected computer, the tool will decrypt all encrypted files - and you can resume day-to-day operations, preferably with better cyber security in mind. If you are interested in purchasing the decryption tool contact us at alfredmir@protonmail.com ------------------------------------------------------- | How can you be certain we have the decryption tool? ------------------------------------------------------- In your mail to us attach up to 3 non critical files (up to 3MB, no databases or spreadsheets). We will send them back to you decrypted. ------------------------------------------------------- | What happens if you dont contact us within 48 hours or refuse payment? ------------------------------------------------------- We publish sensitve databases and documents we collected from your network. -------------------------------------------------------
Emails

alfredmir@protonmail.com

Targets

    • Target

      09133f97793186542546f439e518554a5bb17117689c83bc3978cc532ae2f138.sample

    • Size

      3.7MB

    • MD5

      d659325ea3491708820a2beffe9362b8

    • SHA1

      6e7f725401c33332beb2383a6802a7e4b2db30a9

    • SHA256

      09133f97793186542546f439e518554a5bb17117689c83bc3978cc532ae2f138

    • SHA512

      958f4a72530703131be2f25dc906ab7fc8ee174e9cbd13f9c976af7e986593b56a768e0413e6a85d06f2bdc057ac7d9617f6c25cbf8f13cc2f8348bcf441eeb5

    • Modifies Installed Components in the registry

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Tasks