General

  • Target

    91fe89eafca829107a5e80c6f7e875d72dbbfde7441961d6168709f5a42b4553

  • Size

    4.6MB

  • Sample

    220306-cawjmahgc9

  • MD5

    1d8710fba67b6869c39e236680693173

  • SHA1

    813915a095895988679753cb6d7248eaf9dd00be

  • SHA256

    91fe89eafca829107a5e80c6f7e875d72dbbfde7441961d6168709f5a42b4553

  • SHA512

    a316da3f52c509f0f595b93faf047ce56e9721795fe1f1e76aa0045225f8d412cb8718025f7501fa6b97616990fcbe01d240ec4d1c78ab62e8a652a7627d99f9

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\HOW TO RESTORE YOUR FILES.TXT

Ransom Note
Hello! All your files are encrypted and only I can decrypt them. Contact me: [email protected] or [email protected] Write me if you want to return your files - I can do it very quickly! The header of letter must contain extension of encrypted files. I'm always reply within 24 hours. If not - check spam folder, resend your letter or try send letter from another email service. Attention! Do not rename or edit encrypted files: you may have permanent data loss. To prove that I can recover your files, I am ready to decrypt any three files (less than 1Mb) for free (except databases, Excel and backups) HURRY UP! ! ! ! If you do not email me in the next 48 hours then your data may be lost permanently ! ! !

Targets

    • Target

      91fe89eafca829107a5e80c6f7e875d72dbbfde7441961d6168709f5a42b4553

    • Size

      4.6MB

    • MD5

      1d8710fba67b6869c39e236680693173

    • SHA1

      813915a095895988679753cb6d7248eaf9dd00be

    • SHA256

      91fe89eafca829107a5e80c6f7e875d72dbbfde7441961d6168709f5a42b4553

    • SHA512

      a316da3f52c509f0f595b93faf047ce56e9721795fe1f1e76aa0045225f8d412cb8718025f7501fa6b97616990fcbe01d240ec4d1c78ab62e8a652a7627d99f9

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks