General

  • Target

    9678554995ddbcf42d562d43af6f50162703ea60a991594c0ac21b056afdc56f

  • Size

    69KB

  • Sample

    220201-btnsfsegal

  • MD5

    d591354b8ebb378156ce4741d3191b3d

  • SHA1

    5c6346e62370b37c7906b89d3016fd852c1fafbc

  • SHA256

    9678554995ddbcf42d562d43af6f50162703ea60a991594c0ac21b056afdc56f

  • SHA512

    8bcea489f592842c0bda0d45c9be2ac0972a928edd8f17fd0832cd95294c37f2d2a43d904433062d3bd5fcae989922d84db5e0725357a739d3e4071ccb001bbf

Malware Config

Extracted

Path

C:\Program Files\VideoLAN\VLC\locale\eu\LC_MESSAGES\7781EE-Readme.txt

Family

netwalker

Ransom Note
Hi! Your files are encrypted by Netwalker. All encrypted files for this computer has extension: .7781ee -- If for some reason you read this text before the encryption ended, this can be understood by the fact that the computer slows down, and your heart rate has increased due to the ability to turn it off, then we recommend that you move away from the computer and accept that you have been compromised. Rebooting/shutdown will cause you to lose files without the possibility of recovery. -- Our encryption algorithms are very strong and your files are very well protected, the only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypter program, you may damage them and then they will be impossible to recover. For us this is just business and to prove to you our seriousness, we will decrypt you one file for free. Just open our website, upload the encrypted file and get the decrypted file for free. -- Steps to get access on our website: 1.Download and install tor-browser: https://torproject.org/ 2.Open our website: pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion If the website is not available, open another one: rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion 3.Put your personal code in the input form: {code_7781ee: w2hoo3FR2kGpjrNL0uXx6u1yu4nntHUX2KNk6URIHL7Ti6mjXo fUIOoRDMk/+4dPKKIvfvQONz6MrkMnaQKT3Ovg3JJxr+FoQzaM 0i9jKGqJIqV6FSLBpU1YpRsc6T6omU3w2vv0G/qN0xFDJjhKvd Pf55ymhGqAALKd7rF5ArYJTaxAlYnjS6DbT7023oAbSEk9udz9 630CMsGIRH5c+kpNixoj4r4Q9rAshx4ioQr6aqizWapTGEFfQz 1OMQkpM69Wtri5W8qy1j59CEm1LittUkIAiI4W2Q==}
URLs

http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion

http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion

Extracted

Path

C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\09A823-Readme.txt

Family

netwalker

Ransom Note
Hi! Your files are encrypted by Netwalker. All encrypted files for this computer has extension: .09a823 -- If for some reason you read this text before the encryption ended, this can be understood by the fact that the computer slows down, and your heart rate has increased due to the ability to turn it off, then we recommend that you move away from the computer and accept that you have been compromised. Rebooting/shutdown will cause you to lose files without the possibility of recovery. -- Our encryption algorithms are very strong and your files are very well protected, the only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypter program, you may damage them and then they will be impossible to recover. For us this is just business and to prove to you our seriousness, we will decrypt you one file for free. Just open our website, upload the encrypted file and get the decrypted file for free. -- Steps to get access on our website: 1.Download and install tor-browser: https://torproject.org/ 2.Open our website: pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion If the website is not available, open another one: rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion 3.Put your personal code in the input form: {code_09a823: fc/NwioB2ZdjpuYfVzfaITOKgpyMZzBX1L8yWfmli1U5PPCIIW b3V/uq09A2MQhIl4cvxZ0gDBL1EtEoMEUi6EC5E+um1D9yQzaM 0jRgF1AyH6m+UgKrA4spmDcjQnSBUuTkhy0OziEkrzVeA/1F4R 3XCDxsBkuew8DLf8fn2X6MHwGpumIiezOIyB10z2PJmKD5ffRZ COXF2vCl+yTgm5oGNvhgrQre4f3BubqQeaPy7aAilAp556zOww qv+TcHLcE3c4YVzDNbUd+Ctc8QxKUtoD5OMDczYA==}
URLs

http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion

http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion

Targets

    • Target

      9678554995ddbcf42d562d43af6f50162703ea60a991594c0ac21b056afdc56f

    • Size

      69KB

    • MD5

      d591354b8ebb378156ce4741d3191b3d

    • SHA1

      5c6346e62370b37c7906b89d3016fd852c1fafbc

    • SHA256

      9678554995ddbcf42d562d43af6f50162703ea60a991594c0ac21b056afdc56f

    • SHA512

      8bcea489f592842c0bda0d45c9be2ac0972a928edd8f17fd0832cd95294c37f2d2a43d904433062d3bd5fcae989922d84db5e0725357a739d3e4071ccb001bbf

    • Netwalker Ransomware

      Ransomware family with multiple versions. Also known as MailTo.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

File Deletion

2
T1107

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Impact

Inhibit System Recovery

2
T1490

Tasks