General

  • Target

    0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216

  • Size

    147KB

  • Sample

    211102-s5jfjshccp

  • MD5

    86ad533921708b0668096db5c7625412

  • SHA1

    5fa4eea3b307a2de4de5e86620f40aa83e0c7938

  • SHA256

    0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216

  • SHA512

    a1af898f3b2ef1d01e3406dfc1acb4bafb9f9931de9005d33f1c17bccbdf0b27abd0d20e2d00771ccf1ce4920836145c7f70e4b913b4ceb350bdf0fa889b27ea

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\RESTORE_FILES_INFO.txt

Ransom Note
YOUR COMPANY WAS HACKED AND COMPROMISED!!! All your important files have been encrypted! Our encryption algorithms are very strong and your files are very well protected, the only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypter program, you may damage them and then they will be impossible to recover. ____________________________________________________________________________________ For us this is just business and to prove to you our seriousness, we will decrypt you three files for free. Just open our website, upload the encrypted files and get the decrypted files for free. ____________________________________________________________________________________ ! WARNING ! Whole your network was fully COMPROMISED! We has DOWNLOADED of your PRIVATE SENSITIVE Data, including your Billing info, Insuranse cases, Financial reports, Business audit, Banking Accounts! Also we have corporate correspondence, information about your clients. We got even more info about your partners and even about your staff. Additionally, you must know that your sensitive data has been stolen by our analyst experts and if you choose to no cooperate with us, you are exposing yourself to huge penalties with lawsuits and government if we both don't find an agreement. We have seen it before cases with multi million costs in fines and lawsuits, not to mention the company reputation and losing clients trust and the medias calling non-stop for answers. Come chat with us and you could be surprised on how fast we both can find an agreement without getting this incident public. ____________________________________________________________________________________ IF YOU ARE AN EMPLOYER OF A COMPANY THEN YOU SHOULD KNOW THAT SPREADING SENSITIVE INFORMATION ABOUT YOUR COMPANY BEING COMPROMISED IS A VIOLATION OF CONFIDENTIALITY. YOUR COMPANY'S REPUTATION WILL SUFFER AND SANCTIONS WILL BE TAKEN AGAINST YOU. ____________________________________________________________________________________ WE HIGHLY SUGGEST THAT YOU DON'T CONTACT THE AUTHORITIES REGARDING THIS INCIDENT BECAUSE IF YOU DO, THEN AUTHORITIES WILL MAKE THIS PUBLIC WHICH COMES WITH A COST FOR YOUR ENTERPRISE. THE RECOVERY PROCESS OF YOUR FILES WILL BE FASTER IF YOU COME AND CHAT WITH US EARLY. IF YOU CHOOSE TO COOPERATE, YOU WILL SEE THAT WE ARE PROFESSIONALS WHO GIVES GOOD SUPPORT. Instructions for contacting us: ____________________________________________________________________________________ You have way: 1) Using a TOR browser! a. Download and install TOR browser from this site: https://torproject.org/ b. Open the Tor browser. Copy the link: http://spookuhvfyxzph54ikjfwf2mwmxt572krpom7reyayrmxbkizbvkpaid.onion/chat.php?track=NMU7PHR3V5 and paste it in the Tor browser. c. Start a chat and follow the further instructions. Key Identifier: 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
URLs

http://spookuhvfyxzph54ikjfwf2mwmxt572krpom7reyayrmxbkizbvkpaid.onion/chat.php?track=NMU7PHR3V5

Extracted

Path

C:\Users\Admin\Desktop\RESTORE_FILES_INFO.txt

Ransom Note
YOUR COMPANY WAS HACKED AND COMPROMISED!!! All your important files have been encrypted! Our encryption algorithms are very strong and your files are very well protected, the only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypter program, you may damage them and then they will be impossible to recover. ____________________________________________________________________________________ For us this is just business and to prove to you our seriousness, we will decrypt you three files for free. Just open our website, upload the encrypted files and get the decrypted files for free. ____________________________________________________________________________________ ! WARNING ! Whole your network was fully COMPROMISED! We has DOWNLOADED of your PRIVATE SENSITIVE Data, including your Billing info, Insuranse cases, Financial reports, Business audit, Banking Accounts! Also we have corporate correspondence, information about your clients. We got even more info about your partners and even about your staff. Additionally, you must know that your sensitive data has been stolen by our analyst experts and if you choose to no cooperate with us, you are exposing yourself to huge penalties with lawsuits and government if we both don't find an agreement. We have seen it before cases with multi million costs in fines and lawsuits, not to mention the company reputation and losing clients trust and the medias calling non-stop for answers. Come chat with us and you could be surprised on how fast we both can find an agreement without getting this incident public. ____________________________________________________________________________________ IF YOU ARE AN EMPLOYER OF A COMPANY THEN YOU SHOULD KNOW THAT SPREADING SENSITIVE INFORMATION ABOUT YOUR COMPANY BEING COMPROMISED IS A VIOLATION OF CONFIDENTIALITY. YOUR COMPANY'S REPUTATION WILL SUFFER AND SANCTIONS WILL BE TAKEN AGAINST YOU. ____________________________________________________________________________________ WE HIGHLY SUGGEST THAT YOU DON'T CONTACT THE AUTHORITIES REGARDING THIS INCIDENT BECAUSE IF YOU DO, THEN AUTHORITIES WILL MAKE THIS PUBLIC WHICH COMES WITH A COST FOR YOUR ENTERPRISE. THE RECOVERY PROCESS OF YOUR FILES WILL BE FASTER IF YOU COME AND CHAT WITH US EARLY. IF YOU CHOOSE TO COOPERATE, YOU WILL SEE THAT WE ARE PROFESSIONALS WHO GIVES GOOD SUPPORT. Instructions for contacting us: ____________________________________________________________________________________ You have way: 1) Using a TOR browser! a. Download and install TOR browser from this site: https://torproject.org/ b. Open the Tor browser. Copy the link: http://spookuhvfyxzph54ikjfwf2mwmxt572krpom7reyayrmxbkizbvkpaid.onion/chat.php?track=NMU7PHR3V5 and paste it in the Tor browser. c. Start a chat and follow the further instructions. Key Identifier: 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 Number of files that were processed is: 533
URLs

http://spookuhvfyxzph54ikjfwf2mwmxt572krpom7reyayrmxbkizbvkpaid.onion/chat.php?track=NMU7PHR3V5

Extracted

Path

C:\Users\Admin\Desktop\RESTORE_FILES_INFO.hta

Ransom Note
YOUR COMPANY WAS HACKED AND COMPROMISED!!! All your important files have been encrypted! Our encryption algorithms are very strong and your files are very well protected, the only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypter program, you may damage them and then they will be impossible to recover. ____________________________________________________________________________________ For us this is just business and to prove to you our seriousness, we will decrypt you three files for free. Just open our website, upload the encrypted files and get the decrypted files for free. ____________________________________________________________________________________ ! WARNING ! Whole your network was fully COMPROMISED! We has DOWNLOADED of your PRIVATE SENSITIVE Data, including your Billing info, Insuranse cases, Financial reports, Business audit, Banking Accounts! Also we have corporate correspondence, information about your clients. We got even more info about your partners and even about your staff. Additionally, you must know that your sensitive data has been stolen by our analyst experts and if you choose to no cooperate with us, you are exposing yourself to huge penalties with lawsuits and government if we both don't find an agreement. We have seen it before cases with multi million costs in fines and lawsuits, not to mention the company reputation and losing clients trust and the medias calling non-stop for answers. Come chat with us and you could be surprised on how fast we both can find an agreement without getting this incident public. ____________________________________________________________________________________ IF YOU ARE AN EMPLOYER OF A COMPANY THEN YOU SHOULD KNOW THAT SPREADING SENSITIVE INFORMATION ABOUT YOUR COMPANY BEING COMPROMISED IS A VIOLATION OF CONFIDENTIALITY. YOUR COMPANY'S REPUTATION WILL SUFFER AND SANCTIONS WILL BE TAKEN AGAINST YOU. ____________________________________________________________________________________ WE HIGHLY SUGGEST THAT YOU DON'T CONTACT THE AUTHORITIES REGARDING THIS INCIDENT BECAUSE IF YOU DO, THEN AUTHORITIES WILL MAKE THIS PUBLIC WHICH COMES WITH A COST FOR YOUR ENTERPRISE. THE RECOVERY PROCESS OF YOUR FILES WILL BE FASTER IF YOU COME AND CHAT WITH US EARLY. IF YOU CHOOSE TO COOPERATE, YOU WILL SEE THAT WE ARE PROFESSIONALS WHO GIVES GOOD SUPPORT. Instructions for contacting us: ____________________________________________________________________________________ You have way: 1) Using a TOR browser! a. Download and install TOR browser from this site: https://torproject.org/ b. Open the Tor browser. Copy the link: http://spookuhvfyxzph54ikjfwf2mwmxt572krpom7reyayrmxbkizbvkpaid.onion/chat.php?track=NMU7PHR3V5 and paste it in the Tor browser. c. Start a chat and follow the further instructions. Key Identifier: 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 Number of files that were processed is: 533
URLs

http://spookuhvfyxzph54ikjfwf2mwmxt572krpom7reyayrmxbkizbvkpaid.onion/chat.php?track=NMU7PHR3V5

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\RESTORE_FILES_INFO.txt

Ransom Note
YOUR COMPANY WAS HACKED AND COMPROMISED!!! All your important files have been encrypted! Our encryption algorithms are very strong and your files are very well protected, the only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypter program, you may damage them and then they will be impossible to recover. ____________________________________________________________________________________ For us this is just business and to prove to you our seriousness, we will decrypt you three files for free. Just open our website, upload the encrypted files and get the decrypted files for free. ____________________________________________________________________________________ ! WARNING ! Whole your network was fully COMPROMISED! We has DOWNLOADED of your PRIVATE SENSITIVE Data, including your Billing info, Insuranse cases, Financial reports, Business audit, Banking Accounts! Also we have corporate correspondence, information about your clients. We got even more info about your partners and even about your staff. Additionally, you must know that your sensitive data has been stolen by our analyst experts and if you choose to no cooperate with us, you are exposing yourself to huge penalties with lawsuits and government if we both don't find an agreement. We have seen it before cases with multi million costs in fines and lawsuits, not to mention the company reputation and losing clients trust and the medias calling non-stop for answers. Come chat with us and you could be surprised on how fast we both can find an agreement without getting this incident public. ____________________________________________________________________________________ IF YOU ARE AN EMPLOYER OF A COMPANY THEN YOU SHOULD KNOW THAT SPREADING SENSITIVE INFORMATION ABOUT YOUR COMPANY BEING COMPROMISED IS A VIOLATION OF CONFIDENTIALITY. YOUR COMPANY'S REPUTATION WILL SUFFER AND SANCTIONS WILL BE TAKEN AGAINST YOU. ____________________________________________________________________________________ WE HIGHLY SUGGEST THAT YOU DON'T CONTACT THE AUTHORITIES REGARDING THIS INCIDENT BECAUSE IF YOU DO, THEN AUTHORITIES WILL MAKE THIS PUBLIC WHICH COMES WITH A COST FOR YOUR ENTERPRISE. THE RECOVERY PROCESS OF YOUR FILES WILL BE FASTER IF YOU COME AND CHAT WITH US EARLY. IF YOU CHOOSE TO COOPERATE, YOU WILL SEE THAT WE ARE PROFESSIONALS WHO GIVES GOOD SUPPORT. Instructions for contacting us: ____________________________________________________________________________________ You have way: 1) Using a TOR browser! a. Download and install TOR browser from this site: https://torproject.org/ b. Open the Tor browser. Copy the link: http://spookuhvfyxzph54ikjfwf2mwmxt572krpom7reyayrmxbkizbvkpaid.onion/chat.php?track=NMU7PHR3V5 and paste it in the Tor browser. c. Start a chat and follow the further instructions. Key Identifier: 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
URLs

http://spookuhvfyxzph54ikjfwf2mwmxt572krpom7reyayrmxbkizbvkpaid.onion/chat.php?track=NMU7PHR3V5

Extracted

Path

C:\Users\Admin\Desktop\RESTORE_FILES_INFO.txt

Ransom Note
YOUR COMPANY WAS HACKED AND COMPROMISED!!! All your important files have been encrypted! Our encryption algorithms are very strong and your files are very well protected, the only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypter program, you may damage them and then they will be impossible to recover. ____________________________________________________________________________________ For us this is just business and to prove to you our seriousness, we will decrypt you three files for free. Just open our website, upload the encrypted files and get the decrypted files for free. ____________________________________________________________________________________ ! WARNING ! Whole your network was fully COMPROMISED! We has DOWNLOADED of your PRIVATE SENSITIVE Data, including your Billing info, Insuranse cases, Financial reports, Business audit, Banking Accounts! Also we have corporate correspondence, information about your clients. We got even more info about your partners and even about your staff. Additionally, you must know that your sensitive data has been stolen by our analyst experts and if you choose to no cooperate with us, you are exposing yourself to huge penalties with lawsuits and government if we both don't find an agreement. We have seen it before cases with multi million costs in fines and lawsuits, not to mention the company reputation and losing clients trust and the medias calling non-stop for answers. Come chat with us and you could be surprised on how fast we both can find an agreement without getting this incident public. ____________________________________________________________________________________ IF YOU ARE AN EMPLOYER OF A COMPANY THEN YOU SHOULD KNOW THAT SPREADING SENSITIVE INFORMATION ABOUT YOUR COMPANY BEING COMPROMISED IS A VIOLATION OF CONFIDENTIALITY. YOUR COMPANY'S REPUTATION WILL SUFFER AND SANCTIONS WILL BE TAKEN AGAINST YOU. ____________________________________________________________________________________ WE HIGHLY SUGGEST THAT YOU DON'T CONTACT THE AUTHORITIES REGARDING THIS INCIDENT BECAUSE IF YOU DO, THEN AUTHORITIES WILL MAKE THIS PUBLIC WHICH COMES WITH A COST FOR YOUR ENTERPRISE. THE RECOVERY PROCESS OF YOUR FILES WILL BE FASTER IF YOU COME AND CHAT WITH US EARLY. IF YOU CHOOSE TO COOPERATE, YOU WILL SEE THAT WE ARE PROFESSIONALS WHO GIVES GOOD SUPPORT. Instructions for contacting us: ____________________________________________________________________________________ You have way: 1) Using a TOR browser! a. Download and install TOR browser from this site: https://torproject.org/ b. Open the Tor browser. Copy the link: http://spookuhvfyxzph54ikjfwf2mwmxt572krpom7reyayrmxbkizbvkpaid.onion/chat.php?track=NMU7PHR3V5 and paste it in the Tor browser. c. Start a chat and follow the further instructions. Key Identifier: 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 Number of files that were processed is: 1822
URLs

http://spookuhvfyxzph54ikjfwf2mwmxt572krpom7reyayrmxbkizbvkpaid.onion/chat.php?track=NMU7PHR3V5

Extracted

Path

C:\Users\Admin\Desktop\RESTORE_FILES_INFO.hta

Ransom Note
YOUR COMPANY WAS HACKED AND COMPROMISED!!! All your important files have been encrypted! Our encryption algorithms are very strong and your files are very well protected, the only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypter program, you may damage them and then they will be impossible to recover. ____________________________________________________________________________________ For us this is just business and to prove to you our seriousness, we will decrypt you three files for free. Just open our website, upload the encrypted files and get the decrypted files for free. ____________________________________________________________________________________ ! WARNING ! Whole your network was fully COMPROMISED! We has DOWNLOADED of your PRIVATE SENSITIVE Data, including your Billing info, Insuranse cases, Financial reports, Business audit, Banking Accounts! Also we have corporate correspondence, information about your clients. We got even more info about your partners and even about your staff. Additionally, you must know that your sensitive data has been stolen by our analyst experts and if you choose to no cooperate with us, you are exposing yourself to huge penalties with lawsuits and government if we both don't find an agreement. We have seen it before cases with multi million costs in fines and lawsuits, not to mention the company reputation and losing clients trust and the medias calling non-stop for answers. Come chat with us and you could be surprised on how fast we both can find an agreement without getting this incident public. ____________________________________________________________________________________ IF YOU ARE AN EMPLOYER OF A COMPANY THEN YOU SHOULD KNOW THAT SPREADING SENSITIVE INFORMATION ABOUT YOUR COMPANY BEING COMPROMISED IS A VIOLATION OF CONFIDENTIALITY. YOUR COMPANY'S REPUTATION WILL SUFFER AND SANCTIONS WILL BE TAKEN AGAINST YOU. ____________________________________________________________________________________ WE HIGHLY SUGGEST THAT YOU DON'T CONTACT THE AUTHORITIES REGARDING THIS INCIDENT BECAUSE IF YOU DO, THEN AUTHORITIES WILL MAKE THIS PUBLIC WHICH COMES WITH A COST FOR YOUR ENTERPRISE. THE RECOVERY PROCESS OF YOUR FILES WILL BE FASTER IF YOU COME AND CHAT WITH US EARLY. IF YOU CHOOSE TO COOPERATE, YOU WILL SEE THAT WE ARE PROFESSIONALS WHO GIVES GOOD SUPPORT. Instructions for contacting us: ____________________________________________________________________________________ You have way: 1) Using a TOR browser! a. Download and install TOR browser from this site: https://torproject.org/ b. Open the Tor browser. Copy the link: http://spookuhvfyxzph54ikjfwf2mwmxt572krpom7reyayrmxbkizbvkpaid.onion/chat.php?track=NMU7PHR3V5 and paste it in the Tor browser. c. Start a chat and follow the further instructions. Key Identifier: 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 Number of files that were processed is: 1822
URLs

http://spookuhvfyxzph54ikjfwf2mwmxt572krpom7reyayrmxbkizbvkpaid.onion/chat.php?track=NMU7PHR3V5

Targets

    • Target

      0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216

    • Size

      147KB

    • MD5

      86ad533921708b0668096db5c7625412

    • SHA1

      5fa4eea3b307a2de4de5e86620f40aa83e0c7938

    • SHA256

      0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216

    • SHA512

      a1af898f3b2ef1d01e3406dfc1acb4bafb9f9931de9005d33f1c17bccbdf0b27abd0d20e2d00771ccf1ce4920836145c7f70e4b913b4ceb350bdf0fa889b27ea

    • Downloads MZ/PE file

    • Downloads PsExec from SysInternals website

      Sysinternals tools like PsExec are often leveraged maliciously by malware families due to being commonly used by testers/administrators.

    • Modifies Windows Firewall

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Deletes itself

    • Drops startup file

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies WinLogon

MITRE ATT&CK Enterprise v6

Tasks