General

  • Target

    7da1eedc1d33ae42f326c4ac222a911c5a3bd1e9997b913fc550debf9b53a58c

  • Size

    253KB

  • Sample

    220419-qpf95sacem

  • MD5

    651a44b6585b8f178752dae7a8aeef57

  • SHA1

    2b81118b2ed620d26181a1e97decdb93c47b8ed1

  • SHA256

    7da1eedc1d33ae42f326c4ac222a911c5a3bd1e9997b913fc550debf9b53a58c

  • SHA512

    b6ac1947c4d36c2bdc357ecd4ceed4612046f524978579003d9e9e5ba0e5b95ee48420127020a50ecd6b665095a07b4ac2c116703cb3cdd242dd5ad50f488883

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta

Ransom Note
YOUR FILES ARE ENCRYPTED Don't worry,you can return all your files! If you want to restore them, follow this link: http://dj55huaqbbsnhwngb5rgeq65ns3nteyon7wlp32gkamzs3k2ogrdr5qd.onion/chat.php or Telegram telegram_@spacedatax Your ID DF56BDA4 Use Tor Browser to access this address. If you have not been answered via the link within 12 hours, write to us by e-mail: telegram_@spacedatax Attention! Do not rename encrypted files. Do not try to decrypt your data using third party software, it may cause permanent data loss. Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.
URLs

http://dj55huaqbbsnhwngb5rgeq65ns3nteyon7wlp32gkamzs3k2ogrdr5qd.onion/chat.php

Targets

    • Target

      7da1eedc1d33ae42f326c4ac222a911c5a3bd1e9997b913fc550debf9b53a58c

    • Size

      253KB

    • MD5

      651a44b6585b8f178752dae7a8aeef57

    • SHA1

      2b81118b2ed620d26181a1e97decdb93c47b8ed1

    • SHA256

      7da1eedc1d33ae42f326c4ac222a911c5a3bd1e9997b913fc550debf9b53a58c

    • SHA512

      b6ac1947c4d36c2bdc357ecd4ceed4612046f524978579003d9e9e5ba0e5b95ee48420127020a50ecd6b665095a07b4ac2c116703cb3cdd242dd5ad50f488883

    • Dharma

      Dharma is a ransomware that uses security software installation to hide malicious activities.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks