General

  • Target

    0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7

  • Size

    56KB

  • Sample

    211129-nllz4sfag4

  • MD5

    af2cac864d51827a760560a2d1df8fe8

  • SHA1

    651f6e8aeb91cf84eb809a3d0fdcf67ba80c8339

  • SHA256

    0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7

  • SHA512

    dbc929410cf09408086cdff6b5e03e143568296084929c19eefc045e5228676cbd40e6daaf3a39463c69ec87c1ca099f2f50dc92351cb802f3aa1642be205b86

Score
10/10

Malware Config

Extracted

Path

\??\c:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\RecoveryManual.html

Ransom Note
<html> <head> <title>RECOVERY MANUAL</title> </head> <body> <h1>Your ClientId:</h1> <b> <pre> acc47d8e8c2a4ba5c4c325fca35d0ae4348f6913d8a37fc7eb0e40e1d577985a </pre> </b> <hr/> If you are here, you want to know what happened.<br><br> We infiltrated your network, controlled it for a while, examined your data, downloaded sensitive information and finally encrypted your computers.<br> Your files are safe, but encrypted. Any attempt to decrypt files with third-party software will permanently corrupt content.<br><br> <b>What now?</b><br><br> We advise you to be in touch and start negotiations, otherwise your confidential data will be published on few our news sites and promoted in all possible ways.<br> Data publication and even the fact of this leak for sure will lead to significant losses for your company: <ul> <li>government fines <li>lawsuits and as a result legal claims payments <li>additional expenses on law services <li>data recovery </ul> Also you shouldn't underestimate huge damage for your reputation, which can cause crash of equity prices, clients withdrawal and other negative consequences.<br><br> <b>But don't panic! We are doing business, not war.</b><br><br> We can unlock your data and keep everything in secret. All, what we want is a ransom.<br><br> If we can reach an agreement, you also get: <ul> <li>security report <li>full file tree of compromised data <li>downloaded data unrecoverable deletion <li>support with unlocking and network protection advice. </ul> <b>How can you contact us?</b><br> Visit our support chat. It is simple, secure and you can set a password to avoid intervention of unauthorised persons.<br> <a href="http://evl425tkt4hkwryyplvqu6bn6slfow3fa4xwgvwe5t4zf6gizs3ewuyd.onion/?cid=acc47d8e8c2a4ba5c4c325fca35d0ae4348f6913d8a37fc7eb0e40e1d577985a">http://evl425tkt4hkwryyplvqu6bn6slfow3fa4xwgvwe5t4zf6gizs3ewuyd.onion/?cid=acc47d8e8c2a4ba5c4c325fca35d0ae4348f6913d8a37fc7eb0e40e1d577985a</a> <ul> <li>Password field should be blank for the first login. <li>Note that this server is available via Tor browser only. </ul> Follow the instructions to open the link: <ol> <li>Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor Project website. <li>Press "Download Tor", then press "Download Tor Browser Bundle", install and run it. <li>Now you have Tor browser. In the Tor Browser open "http://evl425tkt4hkwryyplvqu6bn6slfow3fa4xwgvwe5t4zf6gizs3ewuyd.onion/?cid=acc47d8e8c2a4ba5c4c325fca35d0ae4348f6913d8a37fc7eb0e40e1d577985a". <li>Start a chat and introduce yourself (Company name and your position). </ol> Password field should be blank for the first login. You can ask an operator to set password later. </body> </html>

Extracted

Path

\??\c:\RecoveryManual.html

Ransom Note
<html> <head> <title>RECOVERY MANUAL</title> </head> <body> <h1>Your ClientId:</h1> <b> <pre> acc47d8e8c2a4ba5c4c325fca35d0ae42d916415d8a066cbeb0e40e1d5779852 </pre> </b> <hr/> If you are here, you want to know what happened.<br><br> We infiltrated your network, controlled it for a while, examined your data, downloaded sensitive information and finally encrypted your computers.<br> Your files are safe, but encrypted. Any attempt to decrypt files with third-party software will permanently corrupt content.<br><br> <b>What now?</b><br><br> We advise you to be in touch and start negotiations, otherwise your confidential data will be published on few our news sites and promoted in all possible ways.<br> Data publication and even the fact of this leak for sure will lead to significant losses for your company: <ul> <li>government fines <li>lawsuits and as a result legal claims payments <li>additional expenses on law services <li>data recovery </ul> Also you shouldn't underestimate huge damage for your reputation, which can cause crash of equity prices, clients withdrawal and other negative consequences.<br><br> <b>But don't panic! We are doing business, not war.</b><br><br> We can unlock your data and keep everything in secret. All, what we want is a ransom.<br><br> If we can reach an agreement, you also get: <ul> <li>security report <li>full file tree of compromised data <li>downloaded data unrecoverable deletion <li>support with unlocking and network protection advice. </ul> <b>How can you contact us?</b><br> Visit our support chat. It is simple, secure and you can set a password to avoid intervention of unauthorised persons.<br> <a href="http://evl425tkt4hkwryyplvqu6bn6slfow3fa4xwgvwe5t4zf6gizs3ewuyd.onion/?cid=acc47d8e8c2a4ba5c4c325fca35d0ae42d916415d8a066cbeb0e40e1d5779852">http://evl425tkt4hkwryyplvqu6bn6slfow3fa4xwgvwe5t4zf6gizs3ewuyd.onion/?cid=acc47d8e8c2a4ba5c4c325fca35d0ae42d916415d8a066cbeb0e40e1d5779852</a> <ul> <li>Password field should be blank for the first login. <li>Note that this server is available via Tor browser only. </ul> Follow the instructions to open the link: <ol> <li>Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor Project website. <li>Press "Download Tor", then press "Download Tor Browser Bundle", install and run it. <li>Now you have Tor browser. In the Tor Browser open "http://evl425tkt4hkwryyplvqu6bn6slfow3fa4xwgvwe5t4zf6gizs3ewuyd.onion/?cid=acc47d8e8c2a4ba5c4c325fca35d0ae42d916415d8a066cbeb0e40e1d5779852". <li>Start a chat and introduce yourself (Company name and your position). </ol> Password field should be blank for the first login. You can ask an operator to set password later. </body> </html>

Targets

    • Target

      0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7

    • Size

      56KB

    • MD5

      af2cac864d51827a760560a2d1df8fe8

    • SHA1

      651f6e8aeb91cf84eb809a3d0fdcf67ba80c8339

    • SHA256

      0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7

    • SHA512

      dbc929410cf09408086cdff6b5e03e143568296084929c19eefc045e5228676cbd40e6daaf3a39463c69ec87c1ca099f2f50dc92351cb802f3aa1642be205b86

    Score
    10/10
    • MountLocker Ransomware

      Ransomware family first seen in late 2020, which threatens to leak files if ransom is not paid.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Deletes itself

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v6

Tasks