Description
Ransomware which is a variant of the STOP family.
Fri051e1e7444.exe
403KB
211022-v8trsscggr
b4c503088928eef0e973a269f66a0dd2
eb7f418b03aa9f21275de0393fcbf0d03b9719d5
2a95ce43c87b8a26be71a459eae796a572422bd99cf0b9a3580a3a68e7dbd1a2
c6fe2e2b5fbf9348701d1721f2b7ac7589b04b0308ae152e3a7186692b14f35e55bc7eed0c94a03031837b6f2b6aa4dc8d094aefce02913f1fbc4dedea452465
Path | C:\_readme.txt |
Family | djvu |
Ransom Note |
ATTENTION!
Don't worry, you can return all your files!
All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key.
The only method of recovering files is to purchase decrypt tool and unique key for you.
This software will decrypt all your encrypted files.
What guarantees you have?
You can send one of your encrypted file from your PC and we decrypt it for free.
But we can decrypt only 1 file for free. File must not contain valuable information.
You can get and look video overview decrypt tool:
https://we.tl/t-pk3SGFlmek
Price of private key and decrypt software is $980.
Discount 50% available if you contact us first 72 hours, that's price for you is $490.
Please note that you'll never restore your data without payment.
Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours.
To get this software you need write on our e-mail:
manager@mailtemp.ch
Reserve e-mail address to contact us:
supporthelp@airmail.cc
Your personal ID:
0341gSd743dw5bW9VHoXUsivc5FZ0yEV7QenO6CpYtFwFaxwujj
|
Emails |
manager@mailtemp.ch supporthelp@airmail.cc |
URLs |
https://we.tl/t-pk3SGFlmek |
Family | vidar |
Version | 41.5 |
Botnet | 903 |
C2 |
https://mas.to/@xeroxxx |
Attributes |
profile_id 903 |
Family | smokeloader |
Version | 2020 |
C2 |
http://gejajoo7.top/ http://sysaheu9.top/ |
rc4.i32 |
|
rc4.i32 |
|
Family | vidar |
Version | 41.5 |
Botnet | 937 |
C2 |
https://mas.to/@xeroxxx |
Attributes |
profile_id 937 |
Family | redline |
C2 |
205.185.119.191:60857 |
Family | vidar |
Version | 41.5 |
Botnet | 921 |
C2 |
https://mas.to/@xeroxxx |
Attributes |
profile_id 921 |
Family | raccoon |
Botnet | 7c9b4504a63ed23664e38808e65948379b790395 |
Attributes |
url4cnc http://telegka.top/capibar http://telegin.top/capibar https://t.me/capibar |
rc4.plain |
|
rc4.plain |
|
Family | vidar |
Version | 41.5 |
Botnet | 933 |
C2 |
https://mas.to/@xeroxxx |
Attributes |
profile_id 933 |
Family | djvu |
C2 |
http://rlrz.org/lancer |
Fri051e1e7444.exe
b4c503088928eef0e973a269f66a0dd2
403KB
eb7f418b03aa9f21275de0393fcbf0d03b9719d5
2a95ce43c87b8a26be71a459eae796a572422bd99cf0b9a3580a3a68e7dbd1a2
c6fe2e2b5fbf9348701d1721f2b7ac7589b04b0308ae152e3a7186692b14f35e55bc7eed0c94a03031837b6f2b6aa4dc8d094aefce02913f1fbc4dedea452465
Ransomware which is a variant of the STOP family.
This typically indicates the parent process was compromised via an exploit or macro.
Simple but powerful infostealer which was very active in 2019.
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
Modular backdoor trojan in use since 2014.
Socelars is an infostealer targeting browser cookies and credit card credentials.
Vidar is an infostealer based on Arkei stealer.
Zloader is a malware strain that was initially discovered back in August 2015.
suricata: ET MALWARE DCRAT Activity (GET)
suricata: ET MALWARE GCleaner Downloader Activity M5
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Win32.Raccoon Stealer CnC Activity (dependency download)
suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt
suricata: ET MALWARE Win32/Kelihos.F exe Download 2
XMRig is a high performance, open source, cross platform CPU/GPU miner.
Ransomware generally changes the extension on encrypted files.
BIOS information is often read in order to detect sandboxing environments.
Looks up country code configured in the registry, likely geofence.
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Email clients store some user data on disk where infostealers will often target it.
Infostealers often target stored browser data, which can include saved credentials etc.
Looks up Uninstall key entries in the registry to enumerate software on the system.
Uses a legitimate IP lookup service to find the infected system's external IP.