General

  • Target

    f543c477ba67afd4fb2ae111b22c8d596bf8e61e13a627f6a972fac4762a70c1

  • Size

    156KB

  • Sample

    210820-s34d1zxvza

  • MD5

    c063c86931c662c1a962d08915d9f3a8

  • SHA1

    fc9284b7a140c0d411ebd0eb4752e477d5d213fc

  • SHA256

    f543c477ba67afd4fb2ae111b22c8d596bf8e61e13a627f6a972fac4762a70c1

  • SHA512

    d90d80f0ad27d38e0e70079de3a090dfab41d07465be0031745fc60a3fd4303ea8b7e7b852a377838a4c159a65f9ed3fb2b49c4ba1f713fd1ddc09df77006b3e

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\!TXDOT_READ_ME!.txt

Ransom Note
Greetings, Texas Department of Transportation! Read this message CAREFULLY and contact someone from IT department. Your files are securely ENCRYPTED. No third party decryption software EXISTS. MODIFICATION or RENAMING encrypted files may cause decryption failure. You can send us an encrypted file (not greater than 400KB) and we will decrypt it FOR FREE, so you have no doubts in possibility to restore all files from all affected systems ANY TIME. Encrypted file SHOULD NOT contain sensitive information (technical, backups, databases, large documents). The rest of data will be available after the PAYMENT. Infrastructure rebuild will cost you MUCH more. Contact us ONLY if you officially represent the whole affected network. The ONLY attachments we accept are non archived encrypted files for test decryption. Speak ENGLISH when contacting us. Mail us: [email protected] We kindly ask you not to use GMAIL, YAHOO or LIVE to contact us. The PRICE depends on how quickly you do it. �

Targets

    • Target

      f543c477ba67afd4fb2ae111b22c8d596bf8e61e13a627f6a972fac4762a70c1

    • Size

      156KB

    • MD5

      c063c86931c662c1a962d08915d9f3a8

    • SHA1

      fc9284b7a140c0d411ebd0eb4752e477d5d213fc

    • SHA256

      f543c477ba67afd4fb2ae111b22c8d596bf8e61e13a627f6a972fac4762a70c1

    • SHA512

      d90d80f0ad27d38e0e70079de3a090dfab41d07465be0031745fc60a3fd4303ea8b7e7b852a377838a4c159a65f9ed3fb2b49c4ba1f713fd1ddc09df77006b3e

    • Deletes NTFS Change Journal

      The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.

    • RansomEXX Ransomware

      Targeted ransomware with variants which affect Windows and Linux systems.

    • Clears Windows event logs

    • Modifies boot configuration data using bcdedit

    • Deletes backup catalog

      Uses wbadmin.exe to inhibit system recovery.

    • Disables use of System Restore points

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Overwrites deleted data with Cipher tool

      Cipher is a Windows tool which be used to securely wipe deallocated HDD space, preventing recovery of deleted data.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks