General

  • Target

    796e87c1cf5c8e271c3a8893931f64040e0689fb254a8525e99f6739b190de2a

  • Size

    1.2MB

  • Sample

    220201-qxasbsfagn

  • MD5

    8a89e5c03754adcefc90140c4c390076

  • SHA1

    9e1fe27a25bd5d36c1d057b7d074dc7ec1ff0240

  • SHA256

    796e87c1cf5c8e271c3a8893931f64040e0689fb254a8525e99f6739b190de2a

  • SHA512

    3eafe2364124e55060629cabc2b2cb4974b4074e35704fac0447cc8f8f8cc3a2540a94cc381b4b4a305666ba97f67b5097ba00871318d948a915ad134e256851

Malware Config

Extracted

Path

C:\Users\Public\Desktop\README_LOCKED.txt

Ransom Note
Greetings! There was a significant flaw in the security system of your company. You should be thankful that the flaw was exploited by serious people and not some rookies. They would have damaged all of your data by mistake or for fun. Your files are encrypted with the strongest military algorithms RSA4096 and AES-256. Without our special decoder it is impossible to restore the data. Attempts to restore your data with third party software as Photorec, RannohDecryptor etc. will lead to irreversible destruction of your data. To confirm our honest intentions. Send us 2-3 different random files and you will get them decrypted. It can be from different computers on your network to be sure that our decoder decrypts everything. Sample files we unlock for free (files should not be related to any kind of backups). We exclusively have decryption software for your situation DO NOT RESET OR SHUTDOWN - files may be damaged. DO NOT RENAME the encrypted files. DO NOT MOVE the encrypted files. This may lead to the impossibility of recovery of the certain files. The payment has to be made in Bitcoins. The final price depends on how fast you contact us. As soon as we receive the payment you will get the decryption tool and instructions on how to improve your systems security To get information on the price of the decoder contact us at: DharmaParrack@protonmail.com wyattpettigrew8922555@mail.com
Emails

DharmaParrack@protonmail.com

wyattpettigrew8922555@mail.com

Targets

    • Target

      796e87c1cf5c8e271c3a8893931f64040e0689fb254a8525e99f6739b190de2a

    • Size

      1.2MB

    • MD5

      8a89e5c03754adcefc90140c4c390076

    • SHA1

      9e1fe27a25bd5d36c1d057b7d074dc7ec1ff0240

    • SHA256

      796e87c1cf5c8e271c3a8893931f64040e0689fb254a8525e99f6739b190de2a

    • SHA512

      3eafe2364124e55060629cabc2b2cb4974b4074e35704fac0447cc8f8f8cc3a2540a94cc381b4b4a305666ba97f67b5097ba00871318d948a915ad134e256851

    • LockerGoga

      LockerGoga is a ransomware that is primarily used in targeted, disruptive attacks.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks