General

  • Target

    aaf1c2e67e9049fcbfd9f97302d78837769e1ad20fb2c4f35c69339e95845938

  • Size

    994KB

  • Sample

    220131-ek6tfsfcg3

  • MD5

    0cefce0dbbbedc5eb1febe4d85b23c71

  • SHA1

    6aef7d5a462268c438c8417ee0da3f130b8aa84a

  • SHA256

    aaf1c2e67e9049fcbfd9f97302d78837769e1ad20fb2c4f35c69339e95845938

  • SHA512

    1311cf0b918419c192b3914a01e467430f445aaf6a003338e2176b1527c74263f658d8d39bd6d9c78b70324615101026767034798945d42d25215ee4d45654bf

Score
10/10

Malware Config

Extracted

Path

C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\!Decrypt-All-Files-uqvplrh.txt

Ransom Note
Your documents, photos, databases and other important files have been encrypted with strongest encryption and unique key, generated for this computer. Private decryption key is stored on a secret Internet server and nobody can decrypt your files until you pay and obtain the private key. If you see the main locker window, follow the instructions on the locker. Overwise, it's seems that you or your antivirus deleted the locker program. Now you have the last chance to decrypt your files. Open http://onja764ig6vah2jo.onion.cab or http://onja764ig6vah2jo.tor2web.org in your browser. They are public gates to the secret server. If you have problems with gates, use direct connection: 1. Download Tor Browser from http://torproject.org 2. In the Tor Browser open the http://onja764ig6vah2jo.onion/ Note that this server is available via Tor Browser only. Retry in 1 hour if site is not reachable. Copy and paste the following public key in the input form on server. Avoid missprints. 6C3IHNY-F4VQY3F-5YAGJ5J-2MAPEX4-54DKIYI-AUPXLGB-B4CCDVC-BE4FO4N THYNNNX-KFXWSHY-V26PVBA-KLZOHHX-ECANY7X-LBQ74NU-57FMZLE-SHK4PTL XXM2MCV-3QMBBGF-ZXTCOBY-7AIFTQC-4K4CCBW-PRTSXLP-6774Z3V-VBM44EO Follow the instructions on the server.
URLs

http://onja764ig6vah2jo.onion.cab

http://onja764ig6vah2jo.tor2web.org

http://onja764ig6vah2jo.onion/

Targets

    • Target

      aaf1c2e67e9049fcbfd9f97302d78837769e1ad20fb2c4f35c69339e95845938

    • Size

      994KB

    • MD5

      0cefce0dbbbedc5eb1febe4d85b23c71

    • SHA1

      6aef7d5a462268c438c8417ee0da3f130b8aa84a

    • SHA256

      aaf1c2e67e9049fcbfd9f97302d78837769e1ad20fb2c4f35c69339e95845938

    • SHA512

      1311cf0b918419c192b3914a01e467430f445aaf6a003338e2176b1527c74263f658d8d39bd6d9c78b70324615101026767034798945d42d25215ee4d45654bf

    Score
    10/10
    • CTB-Locker

      Ransomware family which uses Tor to hide its C2 communications.

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Loads dropped DLL

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks