General

  • Target

    dd6cd5f36e4a694ff65b7e955301fd7c7e18be5e

  • Size

    2.9MB

  • MD5

    38fd9820a19608e9c2ae7fc44491cb86

  • SHA1

    dd6cd5f36e4a694ff65b7e955301fd7c7e18be5e

  • SHA256

    3ed830b0803b63aca0a82661475c863801afd2e2b03c2675b05019d55f25a1f4

  • SHA512

    7f5346d92e15fb87805a116484fa1eb303ca251debc674fac366ed5ec6654c22914f114ae7af771346a461ac06961af7d80a508595a7de0015516d09e4edbddc

Score
10/10

Malware Config

Extracted

Family

blackcat

Attributes
  • enable_network_discovery

    true

  • enable_self_propagation

    true

  • enable_set_wallpaper

    true

  • extension

    d0mrj6x

  • note_file_name

    RECOVER-${EXTENSION}-FILES.txt

  • note_full_text

    >> What happened? Important files on your network was ENCRYPTED and now they have "${EXTENSION}" extension. In order to recover your files you need to follow instructions below. >> Sensitive Data Sensitive data on your network was DOWNLOADED. If you DON'T WANT your sensitive data to be PUBLISHED you have to act quickly. Data includes: - Employees personal data, CVs, DL, SSN. - Complete network map including credentials for local and remote services. - Private financial information including: clients data, bills, budgets, annual reports, bank statements. - Manufacturing documents including: datagrams, schemas, drawings in solidworks format - And more... >> CAUTION DO NOT MODIFY ENCRYPTED FILES YOURSELF. DO NOT USE THIRD PARTY SOFTWARE TO RESTORE YOUR DATA. YOU MAY DAMAGE YOUR FILES, IT WILL RESULT IN PERMANENT DATA LOSS. >> What should I do next? 1) Download and install Tor Browser from: https://torproject.org/ 2) Navigate to: http://i34u6c7qly6jtv6btnptj2so4oirruhfrslyr7r6g22u6aguyok333ad.onion/?access-key=${ACCESS_KEY}

rsa_pubkey.plain

Signatures

Files

  • dd6cd5f36e4a694ff65b7e955301fd7c7e18be5e
    .exe windows x86

    676f66b42797477a467945daedd979f3


    Code Sign

    Headers

    Imports

    Sections