General

  • Target

    2cf54942e8cf0ef6296deaa7975618dadff0c32535295d3f0d5f577552229ffc

  • Size

    2.6MB

  • Sample

    220210-j68mdsgfhk

  • MD5

    ed075c4718fd98efcbc845db00677065

  • SHA1

    f466b4d686d1fa9fed064507639b9306b0d80bbf

  • SHA256

    2cf54942e8cf0ef6296deaa7975618dadff0c32535295d3f0d5f577552229ffc

  • SHA512

    e183ad2ee95d9e94dcfff99f93e01077422db0c7b01a2ba4b6d830bf5ef0f1c400aae67617ebcce32bb25537786781d13458a0abea7efba6bb9062cafa39cc8c

Score
10/10

Malware Config

Extracted

Family

blackcat

Credentials
  • Username:
    KELLERSUPPLY\Administrator
  • Password:
    d@gw00d
  • Username:
    KELLERSUPPLY\AdminRecovery
  • Password:
    K3ller!$Supp1y
  • Username:
    .\Administrator
  • Password:
    d@gw00d
  • Username:
    .\Administrator
  • Password:
    K3ller!$Supp1y
Attributes
  • enable_network_discovery

    true

  • enable_self_propagation

    false

  • enable_set_wallpaper

    true

  • extension

    sykffle

  • note_file_name

    RECOVER-${EXTENSION}-FILES.txt

  • note_full_text

    >> Introduction Important files on your system was ENCRYPTED and now they have have "${EXTENSION}" extension. In order to recover your files you need to follow instructions below. >> Sensitive Data Sensitive data on your system was DOWNLOADED and it will be PUBLISHED if you refuse to cooperate. Data includes: - Employees personal data, CVs, DL, SSN. - Complete network map including credentials for local and remote services. - Financial information including clients data, bills, budgets, annual reports, bank statements. - Complete datagrams/schemas/drawings for manufacturing in solidworks format - And more... Private preview is published here: http://zujgzbu5y64xbmvc42addp4lxkoosb4tslf5mehnh7pvqjpwxn5gokyd.onion/b21e1fb6-ff88-425b-8339-3523179a1e3e/886cf430a907bbe9a3fd38fb704d524dbd199c1b042ad6f65dc72ad78704e21 >> CAUTION DO NOT MODIFY FILES YOURSELF. DO NOT USE THIRD PARTY SOFTWARE TO RESTORE YOUR DATA. YOU MAY DAMAGE YOUR FILES, IT WILL RESULT IN PERMANENT DATA LOSS. YOUR DATA IS STRONGLY ENCRYPTED, YOU CAN NOT DECRYPT IT WITHOUT CIPHER KEY. >> Recovery procedure Follow these simple steps to get in touch and recover your data: 1) Download and install Tor Browser from: https://torproject.org/ 2) Navigate to: http://mu75ltv3lxd24dbyu6gtvmnwybecigs5auki7fces437xvvflzva2nqd.onion/?access-key=${ACCESS_KEY}

rsa_pubkey.plain

Targets

    • Target

      2cf54942e8cf0ef6296deaa7975618dadff0c32535295d3f0d5f577552229ffc

    • Size

      2.6MB

    • MD5

      ed075c4718fd98efcbc845db00677065

    • SHA1

      f466b4d686d1fa9fed064507639b9306b0d80bbf

    • SHA256

      2cf54942e8cf0ef6296deaa7975618dadff0c32535295d3f0d5f577552229ffc

    • SHA512

      e183ad2ee95d9e94dcfff99f93e01077422db0c7b01a2ba4b6d830bf5ef0f1c400aae67617ebcce32bb25537786781d13458a0abea7efba6bb9062cafa39cc8c

    Score
    4/10

MITRE ATT&CK Enterprise v6

Tasks