General

  • Target

    f771389e1e67994756c3dc36278c52996b8798455fbcbb949faff3463a77dc16

  • Size

    3.5MB

  • Sample

    211122-n6rfbsadd8

  • MD5

    a9007a089fc314fda26806fb420cd78d

  • SHA1

    ab3530b512cb96897bbcb8b8e3a9ff4b534c2e06

  • SHA256

    f771389e1e67994756c3dc36278c52996b8798455fbcbb949faff3463a77dc16

  • SHA512

    c2acd3d696891c9aaad61f1ae5a82aeb282289919ec9a713648720593b1bce79da43bdba1430437b5782a4f1d74f06b1ab44fd9562b22ce24163dadc970587fa

Malware Config

Extracted

Path

C:\Program Files\7-Zip\p3qn_HOW_TO_DECRYPT.txt

Family

hive

Ransom Note
Your network has been breached and all data were encrypted. Personal data, financial reports and important documents are ready to disclose. To decrypt all the data and to prevent exfiltrated files to be disclosed at you will need to purchase our decryption software. Please contact our sales department at: Login: Password: To get an access to .onion websites download and install Tor Browser at: https://www.torproject.org/ (Tor Browser is not related to us) Follow the guidelines below to avoid losing your data: - Do not modify, rename or delete *.key.o4kjj files. Your data will be undecryptable. - Do not modify or rename encrypted files. You will lose them. - Do not report to the Police, FBI, etc. They don't care about your business. They simply won't allow you to pay. As a result you will lose everything. - Do not hire a recovery company. They can't decrypt without the key. They also don't care about your business. They believe that they are good negotiators, but it is not. They usually fail. So speak for yourself. - Do not reject to purchase. Exfiltrated files will be publicly disclosed.

Targets

    • Target

      f771389e1e67994756c3dc36278c52996b8798455fbcbb949faff3463a77dc16

    • Size

      3.5MB

    • MD5

      a9007a089fc314fda26806fb420cd78d

    • SHA1

      ab3530b512cb96897bbcb8b8e3a9ff4b534c2e06

    • SHA256

      f771389e1e67994756c3dc36278c52996b8798455fbcbb949faff3463a77dc16

    • SHA512

      c2acd3d696891c9aaad61f1ae5a82aeb282289919ec9a713648720593b1bce79da43bdba1430437b5782a4f1d74f06b1ab44fd9562b22ce24163dadc970587fa

    • Deletes Windows Defender Definitions

      Uses mpcmdrun utility to delete all AV definitions.

    • Hive

      A ransomware written in Golang first seen in June 2021.

    • Modifies Windows Defender Real-time Protection settings

    • Modifies security service

    • Clears Windows event logs

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies boot configuration data using bcdedit

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks