General

  • Target

    72cd1426f13a698c7d63a288f4920147812303e8f10a4e66e414cc7c2206381d

  • Size

    841KB

  • Sample

    220404-g4bhrscbg4

  • MD5

    efed57771cb41fdde63781d1e195912c

  • SHA1

    a71b0545951c99eb6ad4a50c22d02c958003d920

  • SHA256

    72cd1426f13a698c7d63a288f4920147812303e8f10a4e66e414cc7c2206381d

  • SHA512

    6fd84f80ba5f3c53f48a6a0135cedc7b489cca419742e043116468bcda0898398dd7ddff4ac7d0d8b283312d4c411790b8ff74276f14016021597498b306a080

Score
10/10

Malware Config

Extracted

Family

djvu

C2

http://fuyt.org/lancer/get.php

Attributes
  • extension

    .gtys

  • offline_id

    qwVQoIsE2xLety0oNWloOilSDuIBXJGK86LM3ot1

  • payload_url

    http://zerit.top/dl/build2.exe

    http://fuyt.org/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-fnn5kv33Vv Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0439JIjdm

rsa_pubkey.plain

Targets

    • Target

      72cd1426f13a698c7d63a288f4920147812303e8f10a4e66e414cc7c2206381d

    • Size

      841KB

    • MD5

      efed57771cb41fdde63781d1e195912c

    • SHA1

      a71b0545951c99eb6ad4a50c22d02c958003d920

    • SHA256

      72cd1426f13a698c7d63a288f4920147812303e8f10a4e66e414cc7c2206381d

    • SHA512

      6fd84f80ba5f3c53f48a6a0135cedc7b489cca419742e043116468bcda0898398dd7ddff4ac7d0d8b283312d4c411790b8ff74276f14016021597498b306a080

    Score
    10/10
    • Detected Djvu ransomware

    • Djvu Ransomware

      Ransomware which is a variant of the STOP family.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks