General

  • Target

    639af330da2d4389a6ecb1c3e26e5449c3c4fae7f198d158cbcdadc9466d1bcc

  • Size

    346KB

  • Sample

    220216-2wvxnafccq

  • MD5

    8afc9f287ef0f3495b259e497b30f39e

  • SHA1

    bba18a946f11439c766478236b33b3bfcdc2c4fc

  • SHA256

    639af330da2d4389a6ecb1c3e26e5449c3c4fae7f198d158cbcdadc9466d1bcc

  • SHA512

    ca44ca63b5f152ceb8fa988f52f42e0b63ade0d11e2ea023532a2640813235ee0ad5171ddd255e8b86c6686ade64218f3e3c591744a4cf5ba04978f3c14b6d69

Malware Config

Extracted

Path

C:\DECRYPT-FILES.html

Ransom Note
<html> <head> <script> function CopyToClipboard(containerid) { if (document.selection) { var range = document.body.createTextRange(); range.moveToElementText(document.getElementById(containerid)); range.select().createTextRange(); document.execCommand("copy"); } else if (window.getSelection) { var range = document.createRange(); range.selectNode(document.getElementById(containerid)); window.getSelection().addRange(range); document.execCommand("copy"); alert("Base64 copied into the clipboard!") } } </script> <style> html{ margin:0; padding:0; width:100%; height:100%; } body { background: #000000; color: #ececec; font-family: Consolas }; .tooltip { position: relative; display: inline-block; border-bottom: 1px dotted black; } .tooltip .tooltiptext { visibility: hidden; width: 120px; background-color: #555; color: #fff; text-align: center; border-radius: 6px; padding: 5 px 0; position: absolute; z-index: 1; bottom: 125%; left: 50%; margin-left: -60px; opacity: 0; transition: opacity 0.3s; } .tooltip .tooltiptext::after { content: ""; position: absolute; top: 100%; left: 50%; margin-left: -5px; border-width: 5px; border-style: solid; border-color: #555 transparent transparent transparent; } .tooltip:hover .tooltiptext { visibility: visible; opacity: 1; } p#base64{ -ms-word-break: break-all; word-break: break-all; -webkit-hyphens: auto; -moz-hyphens: auto; -ms-hyphens: auto; hyphens: auto; } p#base64:hover{ cursor: hand; } </style> </head> <body> <table style="position: absolute;" width="100%"> <tr> <td style="width: 25%;"> <td style="width: 50%;"> <div style="text-align: center; font-size: 20px;"> <p><b>Maze ransomware</b></p> <p>*********************************************************************************************************************</p> <p>Attention! Your documents, photos, databases, and other important files have been encrypted!</p> <p>*********************************************************************************************************************</p> </div> <div style="text-align: center; font-size: 18px;"> <p><b>What is going on?</b><br>Your files have been encrypted using strong reliable algorithms RSA-2048 and ChaCha20 with an unique private key for your system</p> <p>You can read more about this cryptosystem here: <a href=https://en.wikipedia.org/wiki/RSA_(cryptosystem)>https://en.wikipedia.org/wiki/RSA_(cryptosystem)</a></p> <p>The only way to recover (decrypt) your files is to buy decryptor with the unique private key</p> <p><u>Attention! Only we can recover your files! If someone tell you that he can do this, kindly ask him to proof!</u></p> <p>By us you can decrypt one of your files for free as a proof of work that we have the method to decrypt the rest of your data.</p> <p>In order to either buy the private key or make test decryption contact us via email: <br> <u><b>Main e-mail: koreadec@tutanota.com<br>Reserve e-mail: yourrealdecrypt@airmail.cc</b></u> <p>Remember to hurry up as email address may not be available for very long as soon as law enforcements of different countries always trying to seize emails used in ransom companies <p>If you are willing to pay but you are not sure knock us and we will save your e-mail address. In case the listed addresses are seized we will write you from the new one</p> <p>Below you will see a big base64 blob, you will need to email us and copy this blob to us.<br>you can click on it, and it will be copied into the clipboard.</p> <p>If you have troubles copying it, just send us the file you are currently reading, as an attachment.</p> <p>Base64: </p> </div><div style="text-align: center; font-size: 12px;"><p id="base64" onclick="return CopyToClipboard('base64')" class="tooltip">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<span class="tooltiptext">Click here to copy</span></p></div></td><td style="width: 25%; text-align: right;"></tr></table></body></html>
Emails

koreadec@tutanota.com<br>Reserve

yourrealdecrypt@airmail.cc</b></u>

Extracted

Path

C:\DECRYPT-FILES.html

Ransom Note
<html> <head> <script> function CopyToClipboard(containerid) { if (document.selection) { var range = document.body.createTextRange(); range.moveToElementText(document.getElementById(containerid)); range.select().createTextRange(); document.execCommand("copy"); } else if (window.getSelection) { var range = document.createRange(); range.selectNode(document.getElementById(containerid)); window.getSelection().addRange(range); document.execCommand("copy"); alert("Base64 copied into the clipboard!") } } </script> <style> html{ margin:0; padding:0; width:100%; height:100%; } body { background: #000000; color: #ececec; font-family: Consolas }; .tooltip { position: relative; display: inline-block; border-bottom: 1px dotted black; } .tooltip .tooltiptext { visibility: hidden; width: 120px; background-color: #555; color: #fff; text-align: center; border-radius: 6px; padding: 5 px 0; position: absolute; z-index: 1; bottom: 125%; left: 50%; margin-left: -60px; opacity: 0; transition: opacity 0.3s; } .tooltip .tooltiptext::after { content: ""; position: absolute; top: 100%; left: 50%; margin-left: -5px; border-width: 5px; border-style: solid; border-color: #555 transparent transparent transparent; } .tooltip:hover .tooltiptext { visibility: visible; opacity: 1; } p#base64{ -ms-word-break: break-all; word-break: break-all; -webkit-hyphens: auto; -moz-hyphens: auto; -ms-hyphens: auto; hyphens: auto; } p#base64:hover{ cursor: hand; } </style> </head> <body> <table style="position: absolute;" width="100%"> <tr> <td style="width: 25%;"> <td style="width: 50%;"> <div style="text-align: center; font-size: 20px;"> <p><b>Maze ransomware</b></p> <p>*********************************************************************************************************************</p> <p>Attention! Your documents, photos, databases, and other important files have been encrypted!</p> <p>*********************************************************************************************************************</p> </div> <div style="text-align: center; font-size: 18px;"> <p><b>What is going on?</b><br>Your files have been encrypted using strong reliable algorithms RSA-2048 and ChaCha20 with an unique private key for your system</p> <p>You can read more about this cryptosystem here: <a href=https://en.wikipedia.org/wiki/RSA_(cryptosystem)>https://en.wikipedia.org/wiki/RSA_(cryptosystem)</a></p> <p>The only way to recover (decrypt) your files is to buy decryptor with the unique private key</p> <p><u>Attention! Only we can recover your files! If someone tell you that he can do this, kindly ask him to proof!</u></p> <p>By us you can decrypt one of your files for free as a proof of work that we have the method to decrypt the rest of your data.</p> <p>In order to either buy the private key or make test decryption contact us via email: <br> <u><b>Main e-mail: koreadec@tutanota.com<br>Reserve e-mail: yourrealdecrypt@airmail.cc</b></u> <p>Remember to hurry up as email address may not be available for very long as soon as law enforcements of different countries always trying to seize emails used in ransom companies <p>If you are willing to pay but you are not sure knock us and we will save your e-mail address. In case the listed addresses are seized we will write you from the new one</p> <p>Below you will see a big base64 blob, you will need to email us and copy this blob to us.<br>you can click on it, and it will be copied into the clipboard.</p> <p>If you have troubles copying it, just send us the file you are currently reading, as an attachment.</p> <p>Base64: </p> </div><div style="text-align: center; font-size: 12px;"><p id="base64" onclick="return CopyToClipboard('base64')" class="tooltip">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<span class="tooltiptext">Click here to copy</span></p></div></td><td style="width: 25%; text-align: right;"></tr></table></body></html>
Emails

koreadec@tutanota.com<br>Reserve

yourrealdecrypt@airmail.cc</b></u>

Targets

    • Target

      639af330da2d4389a6ecb1c3e26e5449c3c4fae7f198d158cbcdadc9466d1bcc

    • Size

      346KB

    • MD5

      8afc9f287ef0f3495b259e497b30f39e

    • SHA1

      bba18a946f11439c766478236b33b3bfcdc2c4fc

    • SHA256

      639af330da2d4389a6ecb1c3e26e5449c3c4fae7f198d158cbcdadc9466d1bcc

    • SHA512

      ca44ca63b5f152ceb8fa988f52f42e0b63ade0d11e2ea023532a2640813235ee0ad5171ddd255e8b86c6686ade64218f3e3c591744a4cf5ba04978f3c14b6d69

    • Maze

      Ransomware family also known as ChaCha.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

File Deletion

1
T1107

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Impact

Inhibit System Recovery

1
T1490

Tasks