General

  • Target

    17fad4b7ddf31e503ede4435c120e53515680b1852f1744afafc101496e0bc28

  • Size

    4.6MB

  • Sample

    220305-3r6c9sheh5

  • MD5

    22f8192789fbf5538b59f8b4315ff8cd

  • SHA1

    b7d528419b751bd8aef0b86e9430d49c0714453c

  • SHA256

    17fad4b7ddf31e503ede4435c120e53515680b1852f1744afafc101496e0bc28

  • SHA512

    f451dcf0b05f7af9a1fc54a447083e627ad8c79da6eeff7d761efda7f605efb962bf05bf400cc054bd5cac1902d6e22e5cad8476347e52153a760bb3ec71be00

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\HOW TO RESTORE YOUR FILES.TXT

Ransom Note
Hello! All your files are encrypted, write to me if you want to return your files - I can do it very quickly! Contact me by email: [email protected] or [email protected] The subject line must contain an encryption extension or the name of your company! Do not rename encrypted files, you may lose them forever. You may be a victim of fraud. Free decryption as a guarantee. Send us up to 3 files for free decryption. The total file size should be no more than 1 MB! (not in the archive), and the files should not contain valuable information. (databases, backups, large Excel spreadsheets, etc.) !!! Do not turn off or restart the NAS equipment. This will lead to data loss !!! To contact us, we recommend that you create an email address at protonmail.com or tutanota.com Because gmail and other public email programs can block our messages!

Targets

    • Target

      17fad4b7ddf31e503ede4435c120e53515680b1852f1744afafc101496e0bc28

    • Size

      4.6MB

    • MD5

      22f8192789fbf5538b59f8b4315ff8cd

    • SHA1

      b7d528419b751bd8aef0b86e9430d49c0714453c

    • SHA256

      17fad4b7ddf31e503ede4435c120e53515680b1852f1744afafc101496e0bc28

    • SHA512

      f451dcf0b05f7af9a1fc54a447083e627ad8c79da6eeff7d761efda7f605efb962bf05bf400cc054bd5cac1902d6e22e5cad8476347e52153a760bb3ec71be00

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks