General

  • Target

    9d9a232a03f5a08d77075f673660688a0b4f336fbb2f0fefdcd4776f237eb2e1.bin.sample

  • Size

    3.6MB

  • Sample

    220112-sdblmadadr

  • MD5

    5f37c1a687d21c5f722e5f08f63bebf2

  • SHA1

    921e722e010997e21d8b89cf3fec2953375f0f36

  • SHA256

    9d9a232a03f5a08d77075f673660688a0b4f336fbb2f0fefdcd4776f237eb2e1

  • SHA512

    817f908a9503a055ae867664bb7f58056c224a3772c51ea0abf343cf9adaa2b0355b13ebbb185f38d45a91e31b95e9b0ca2774efc84db1fbef394051e351d9b4

Malware Config

Extracted

Path

C:\agQX_HOW_TO_DECRYPT.txt

Family

hive

Ransom Note
Your network has been breached and all data were encrypted. Personal data, financial reports and important documents are ready to disclose. To decrypt all the data and to prevent exfiltrated files to be disclosed at http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/ you will need to purchase our decryption software. Please contact our sales department at: http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/ Login: NJ3GUyVpkbRC Password: fCeSxq9x7E7KGDdf3Chx To get an access to .onion websites download and install Tor Browser at: https://www.torproject.org/ (Tor Browser is not related to us) Follow the guidelines below to avoid losing your data: - Do not modify, rename or delete *.key.s72gp files. Your data will be undecryptable. - Do not modify or rename encrypted files. You will lose them. - Do not report to the Police, FBI, etc. They don't care about your business. They simply won't allow you to pay. As a result you will lose everything. - Do not hire a recovery company. They can't decrypt without the key. They also don't care about your business. They believe that they are good negotiators, but it is not. They usually fail. So speak for yourself. - Do not reject to purchase. Exfiltrated files will be publicly disclosed.
URLs

http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/

http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/

Targets

    • Target

      9d9a232a03f5a08d77075f673660688a0b4f336fbb2f0fefdcd4776f237eb2e1.bin.sample

    • Size

      3.6MB

    • MD5

      5f37c1a687d21c5f722e5f08f63bebf2

    • SHA1

      921e722e010997e21d8b89cf3fec2953375f0f36

    • SHA256

      9d9a232a03f5a08d77075f673660688a0b4f336fbb2f0fefdcd4776f237eb2e1

    • SHA512

      817f908a9503a055ae867664bb7f58056c224a3772c51ea0abf343cf9adaa2b0355b13ebbb185f38d45a91e31b95e9b0ca2774efc84db1fbef394051e351d9b4

    • Deletes Windows Defender Definitions

      Uses mpcmdrun utility to delete all AV definitions.

    • Hive

      A ransomware written in Golang first seen in June 2021.

    • Modifies Windows Defender Real-time Protection settings

    • Modifies security service

    • Clears Windows event logs

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks