General

  • Target

    foo.exe

  • Size

    94KB

  • Sample

    220217-a89sssgchp

  • MD5

    993b73d6490bc5a7e23e02210b317247

  • SHA1

    6fd314af34409e945504e166eb8cd88127c1070e

  • SHA256

    de04d2402154f676f757cf1380671f396f3fc9f7dbb683d9461edd2718c4e09d

  • SHA512

    417f55a066896695ce1b8d998767f706005d3d6f1792f2b86261a235034a6c3bb1deae6920857fbc710d22b833479b2cbeafd92735381f1cc357adcc8a74c55d

Malware Config

Extracted

Path

C:\odt\C6ED5-Readme.txt

Family

netwalker

Ransom Note
Hi! Your files are encrypted. All encrypted files for this computer has extension: .c6ed5 -- If for some reason you read this text before the encryption ended, this can be understood by the fact that the computer slows down, and your heart rate has increased due to the ability to turn it off, then we recommend that you move away from the computer and accept that you have been compromised, rebooting/shutdown will cause you to lose files without the possibility of recovery and even god will not be able to help you, it could be files on the network belonging to other users, sure you want to take that responsibility? -- Our encryption algorithms are very strong and your files are very well protected, you can't hope to recover them without our help. The only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypt program, you may damage them and then they will be impossible to recover. We advise you to contact us as soon as possible, otherwise there is a possibility that your files will never be returned. For us this is just business and to prove to you our seriousness, we will decrypt you some files for free, but we will not wait for your letter for a long time, mail can be abused, we are moving on, hurry up with the decision. Contact us: 1.knoocknoo@cock.li 2.eeeooppaaaxxx@tuta.io Don't forget to include your code in the email: {code_1b1ea859_c6ed5: Xaw12/IrUsfm38pdIdYgcs6bNVlfLP9TWSeb2zHnueg1PwWVfI 5PfaHHSxeIOxhLEAIKi236+IU5EYJCdGV4P7SNY1ABDv09Wage G8CBTM2TPGsBtSgX6zCD2mGUH0nSKQdgxHMCtUbjdniPdkGL0h gL3l8e9prZAJIo1V4fkkrkk9LSM8Jk4OYW/cRlPoXlx2XoMtFc 6FvAfTCsdTStzg7EF57ZTIrc17jnvT9mD1dt5qUcoasW//wj5f I4ewYbCXyeGn5qUne4UPiEGBEN3cp7qu8=}
Emails

knoocknoo@cock.li

eeeooppaaaxxx@tuta.io

Targets

    • Target

      foo.exe

    • Size

      94KB

    • MD5

      993b73d6490bc5a7e23e02210b317247

    • SHA1

      6fd314af34409e945504e166eb8cd88127c1070e

    • SHA256

      de04d2402154f676f757cf1380671f396f3fc9f7dbb683d9461edd2718c4e09d

    • SHA512

      417f55a066896695ce1b8d998767f706005d3d6f1792f2b86261a235034a6c3bb1deae6920857fbc710d22b833479b2cbeafd92735381f1cc357adcc8a74c55d

    • Detected Netwalker Ransomware

      Detected unpacked Netwalker executable.

    • Netwalker Ransomware

      Ransomware family with multiple versions. Also known as MailTo.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Deletes itself

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

2
T1107

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Impact

Inhibit System Recovery

2
T1490

Tasks