General
-
Target
bd337d4e83ab1c2cacb43e4569f977d188f1bb7c7a077026304bf186d49d4117.bin
-
Size
2.9MB
-
Sample
220120-xph73abbh4
-
MD5
a854c960cde68d43fd42a24e79587b28
-
SHA1
94f025f3be089252692d58e54e3e926e09634e40
-
SHA256
bd337d4e83ab1c2cacb43e4569f977d188f1bb7c7a077026304bf186d49d4117
-
SHA512
ee7f16d9b08cfde6ebced71afbd4bc80d6edf8a916aa6863414cc6aa3cbdfc66cef4d8ebae38f0e3755a1336e6da1c3bfba5acc7de9cc8f6d1fcae76a96b681a
Static task
static1
Behavioral task
behavioral1
Sample
bd337d4e83ab1c2cacb43e4569f977d188f1bb7c7a077026304bf186d49d4117.bin.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
bd337d4e83ab1c2cacb43e4569f977d188f1bb7c7a077026304bf186d49d4117.bin.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
blackcat
- Username:
BALLESTERHERMAN\Administrator - Password:
Tokyo2013
-
enable_network_discovery
true
-
enable_self_propagation
true
-
enable_set_wallpaper
true
-
extension
tx1mdf6
-
note_file_name
RECOVER-${EXTENSION}-FILES.txt
-
note_full_text
>> What happened? Important files on your network was ENCRYPTED and now they have "${EXTENSION}" extension. In order to recover your files you need to follow instructions below. >> Sensitive Data Sensitive data on your system was DOWNLOADED. If you DON'T WANT your sensitive data to be PUBLISHED you have to act quickly. Data includes: - Employees personal data, CVs, DL, SSN. - Complete network map including credentials for local and remote services. - Private financial information including: clients data, bills, budgets, annual reports, bank statements. - Manufacturing documents including: datagrams, schemas, drawings in solidworks format - And more... >> CAUTION DO NOT MODIFY ENCRYPTED FILES YOURSELF. DO NOT USE THIRD PARTY SOFTWARE TO RESTORE YOUR DATA. YOU MAY DAMAGE YOUR FILES, IT WILL RESULT IN PERMANENT DATA LOSS. >> What should I do next? Follow these simple steps to get everything back to normal: 1) Download and install Tor Browser from: https://torproject.org/ 2) Navigate to: http://b6v4ojs7jfvftvcoagjxp7qz33yeljydqy6afzsh26vqbzcjwz4b3zad.onion/?access-key=${ACCESS_KEY}
Targets
-
-
Target
bd337d4e83ab1c2cacb43e4569f977d188f1bb7c7a077026304bf186d49d4117.bin
-
Size
2.9MB
-
MD5
a854c960cde68d43fd42a24e79587b28
-
SHA1
94f025f3be089252692d58e54e3e926e09634e40
-
SHA256
bd337d4e83ab1c2cacb43e4569f977d188f1bb7c7a077026304bf186d49d4117
-
SHA512
ee7f16d9b08cfde6ebced71afbd4bc80d6edf8a916aa6863414cc6aa3cbdfc66cef4d8ebae38f0e3755a1336e6da1c3bfba5acc7de9cc8f6d1fcae76a96b681a
Score8/10-
Sets service image path in registry
-