General

  • Target

    cefea76dfdbb48cfe1a3db2c8df34e898e29bec9b2c13e79ef40655c637833ae.bin

  • Size

    2.2MB

  • Sample

    220120-xqmxmsbbgm

  • MD5

    ff56e700d15f3d944424c295eae926d9

  • SHA1

    e17dc8062742878b0b5ced2145311929f6f77abd

  • SHA256

    cefea76dfdbb48cfe1a3db2c8df34e898e29bec9b2c13e79ef40655c637833ae

  • SHA512

    7e8e0a60351fe66a422410651df15f4e15304339cbcccb25109de4d3aaf28b236c077eb5dc0ce21e3389f9bee8a3a184e0afa79c2f88d5a660c1f86c3247b1a7

Score
10/10

Malware Config

Extracted

Family

blackcat

Credentials
  • Username:
    KELLERSUPPLY\Administrator
  • Password:
    d@gw00d
  • Username:
    KELLERSUPPLY\AdminRecovery
  • Password:
    K3ller!$Supp1y
  • Username:
    .\Administrator
  • Password:
    d@gw00d
  • Username:
    .\Administrator
  • Password:
    K3ller!$Supp1y
Attributes
  • enable_network_discovery

    true

  • enable_self_propagation

    true

  • enable_set_wallpaper

    true

  • extension

    sykffle

  • note_file_name

    RECOVER-${EXTENSION}-FILES.txt

  • note_full_text

    >> Introduction Important files on your system was ENCRYPTED and now they have have "${EXTENSION}" extension. In order to recover your files you need to follow instructions below. >> Sensitive Data Sensitive data on your system was DOWNLOADED and it will be PUBLISHED if you refuse to cooperate. Data includes: - Employees personal data, CVs, DL, SSN. - Complete network map including credentials for local and remote services. - Financial information including clients data, bills, budgets, annual reports, bank statements. - Complete datagrams/schemas/drawings for manufacturing in solidworks format - And more... Private preview is published here: http://zujgzbu5y64xbmvc42addp4lxkoosb4tslf5mehnh7pvqjpwxn5gokyd.onion/b21e1fb6-ff88-425b-8339-3523179a1e3e/886cf430a907bbe9a3fd38fb704d524dbd199c1b042ad6f65dc72ad78704e21 >> CAUTION DO NOT MODIFY FILES YOURSELF. DO NOT USE THIRD PARTY SOFTWARE TO RESTORE YOUR DATA. YOU MAY DAMAGE YOUR FILES, IT WILL RESULT IN PERMANENT DATA LOSS. YOUR DATA IS STRONGLY ENCRYPTED, YOU CAN NOT DECRYPT IT WITHOUT CIPHER KEY. >> Recovery procedure Follow these simple steps to get in touch and recover your data: 1) Download and install Tor Browser from: https://torproject.org/ 2) Navigate to: http://mu75ltv3lxd24dbyu6gtvmnwybecigs5auki7fces437xvvflzva2nqd.onion/?access-key=${ACCESS_KEY}

rsa_pubkey.plain

Targets

    • Target

      cefea76dfdbb48cfe1a3db2c8df34e898e29bec9b2c13e79ef40655c637833ae.bin

    • Size

      2.2MB

    • MD5

      ff56e700d15f3d944424c295eae926d9

    • SHA1

      e17dc8062742878b0b5ced2145311929f6f77abd

    • SHA256

      cefea76dfdbb48cfe1a3db2c8df34e898e29bec9b2c13e79ef40655c637833ae

    • SHA512

      7e8e0a60351fe66a422410651df15f4e15304339cbcccb25109de4d3aaf28b236c077eb5dc0ce21e3389f9bee8a3a184e0afa79c2f88d5a660c1f86c3247b1a7

    Score
    1/10

MITRE ATT&CK Matrix

Tasks