General

  • Target

    9fb1067dd3edf3d517517e9c191f3f07067bf30aa034a36ebf6543d83cea5ec1

  • Size

    2.9MB

  • MD5

    90d553cb5014096dbc6cd9f8772b8084

  • SHA1

    cdab2b5d5c7675c33707a94af857682e499e3905

  • SHA256

    9fb1067dd3edf3d517517e9c191f3f07067bf30aa034a36ebf6543d83cea5ec1

  • SHA512

    1078aeac7e43b00e9d1a1b218a58c68fa7043f6eaae06ea393695461cb1093aa625cb5c1c7753d69b9851d2d1ff16074ed03d761f32b91d7a575516c6672fb3e

Score
10/10

Malware Config

Extracted

Family

blackcat

Attributes
  • enable_network_discovery

    true

  • enable_self_propagation

    true

  • enable_set_wallpaper

    true

  • extension

    qhjlykp

  • note_file_name

    RECOVER-${EXTENSION}-FILES.txt

  • note_full_text

    >> What happened? Important files on your network was ENCRYPTED and now they have "${EXTENSION}" extension. In order to recover your files you need to follow instructions below. >> Sensitive Data Sensitive data on your network was DOWNLOADED. If you DON'T WANT your sensitive data to be PUBLISHED you have to act quickly. Data includes: - Employees personal data, CVs, DL, SSN. - Complete network map including credentials for local and remote services. - Private financial information including: clients data, bills, budgets, annual reports, bank statements. - Manufacturing documents including: datagrams, schemas, drawings in solidworks format - And more... >> CAUTION DO NOT MODIFY ENCRYPTED FILES YOURSELF. DO NOT USE THIRD PARTY SOFTWARE TO RESTORE YOUR DATA. YOU MAY DAMAGE YOUR FILES, IT WILL RESULT IN PERMANENT DATA LOSS. >> What should I do next? 1) Download and install Tor Browser from: https://torproject.org/ 2) Navigate to: http://75wjeeisgj2gg3i7jcczwc4jdmjoqis5bi3x5qk4skhd2eddplmr2lad.onion/?access-key=${ACCESS_KEY}

rsa_pubkey.plain

Signatures

Files

  • 9fb1067dd3edf3d517517e9c191f3f07067bf30aa034a36ebf6543d83cea5ec1
    .exe windows x86

    676f66b42797477a467945daedd979f3


    Code Sign

    Headers

    Imports

    Sections