General

  • Target

    3b18241ac1018db1c2fb5c9e8306490bcafb373c852f1c5ebae65c672632a620

  • Size

    2.9MB

  • MD5

    42ca740c36299106c0e27b503ce90c4d

  • SHA1

    73cbff85d19e2dc93f5f267848f61e10a70796ca

  • SHA256

    3b18241ac1018db1c2fb5c9e8306490bcafb373c852f1c5ebae65c672632a620

  • SHA512

    9fabe022149257a3942bff310174231e19259f1df70119e0f02c5794b6615280ecbccce2ed4bc5af3450bf4f60c41239468be99b1a9af79fc523de8414ae6589

Score
10/10

Malware Config

Extracted

Family

blackcat

Attributes
  • enable_network_discovery

    true

  • enable_self_propagation

    true

  • enable_set_wallpaper

    true

  • extension

    fvnhppg

  • note_file_name

    RECOVER-${EXTENSION}-FILES.txt

  • note_full_text

    >> What happened? Important files on your network was ENCRYPTED and now they have "${EXTENSION}" extension. In order to recover your files you need to follow instructions below. >> Sensitive Data Sensitive data on your network was DOWNLOADED. If you DON'T WANT your sensitive data to be PUBLISHED you have to act quickly. Data includes: - Employees personal data, CVs, DL, SSN. - Complete network map including credentials for local and remote services. - Private financial information including: clients data, bills, budgets, annual reports, bank statements. - Manufacturing documents including: datagrams, schemas, drawings in solidworks format - And more... >> CAUTION DO NOT MODIFY ENCRYPTED FILES YOURSELF. DO NOT USE THIRD PARTY SOFTWARE TO RESTORE YOUR DATA. YOU MAY DAMAGE YOUR FILES, IT WILL RESULT IN PERMANENT DATA LOSS. >> What should I do next? 1) Download and install Tor Browser from: https://torproject.org/ 2) Navigate to: http://gl7las4s6u4tfyhcojiceymwwrbhnd6z47psopf4764l5h2l7d2kieyd.onion/?access-key=${ACCESS_KEY}

rsa_pubkey.plain

Signatures

Files

  • 3b18241ac1018db1c2fb5c9e8306490bcafb373c852f1c5ebae65c672632a620
    .exe windows x86

    676f66b42797477a467945daedd979f3


    Code Sign

    Headers

    Imports

    Sections