Resubmissions

01-05-2022 18:25

220501-w2v7qaadhl 10

01-05-2022 18:22

220501-wz279adge8 10

General

  • Target

    illegal and unillegal.rar.zip

  • Size

    212KB

  • Sample

    220501-w2v7qaadhl

  • MD5

    cf68a7691275717534bc060aba66ffc8

  • SHA1

    b478621b7c2a3ce4948fbc0aa29502e207eb6fe9

  • SHA256

    e47cf35ebb754112c2edca1645a40e0d7985db3a70c93c453c434bef93d23c73

  • SHA512

    9f61a74c9d398f35733802f030f200f70b492baab167b80c30cbecefff777336c29f4b0af05c20b6fb7112fc05d999595401481eb034bba0e3f003948bc92e76

Malware Config

Extracted

Path

C:\Users\Admin\Desktop\readme.txt

Ransom Note
All of your files have been encrypted Your computer was infected with a ransomware virus. Your files have been encrypted and you won't be able to decrypt them without our help. What can I do to get my files back? You can buy our special decryption software, this software will allow you to recover all of your data and remove the ransomware from your computer.The price for the software is depend. Payment can be made by buying hack and send to me only. How do I pay, where i can buy hack? This one only need the hack from any game (personal fav: Geometry Dash, Minecraft, Roblox, Cookie Run) For Minecraft, there're many hack include: Vape V4, Astolfo + Astolfo: https://www.astolfo.lgbt/ + Vape V4: vape.gg For Geometry Dash, only Mega Hack V7 (Mega Hack Pro): https://absolllute.com/store/view_mega_hack_pro For Roblox, there're many like: Synapse X, Script-Ware,... + Synapse X: https://x.synapse.to/ + Script-Ware: https://script-ware.com/ (Windows or iOS) + Protosmasher: https://protosmasher.net/ (dead) For Cookie Run, please no, i don't need right now. (its not worth it, and not avilable, easy to get banned) Note: JUST ONE HACK, NOT MORE. After you bought one of them, send it via: Discord: Danet#7950 Email: bangthlu2@gmail.com I AM THE LAWYER, MY FILE IS ENCRYPTED, NOW GIVE ME BACK- Woah woah woah slow down, i'm sorry lawyer... but you have to proof us you're lawyer and we'll give you an decrypter, good luck. Your public key: uDfsiP4lI2xvhOW/dgdxwvPOOrzBDylv3PcJAXYJh4PZOJaDroaKkDmOQFj2+HXDxd07H6Waqw3v2/y08F/aCiXNwza+600sUYkwxQ7HmyHt+z1q5Me6uVQnbuzbtKqCte2sjAtIxwgcob72cmkTR9ToXrlDYy/6jt8aumzzuRM=
Emails

bangthlu2@gmail.com

URLs

https://www.astolfo.lgbt/

https://absolllute.com/store/view_mega_hack_pro

https://x.synapse.to/

https://script-ware.com/

https://protosmasher.net/

Targets

    • Target

      illegal and unillegal/dead.exe

    • Size

      985KB

    • MD5

      37a0d42671350931168039739cd65c4f

    • SHA1

      e372320a7d1d073a913891e20468932a86c4a086

    • SHA256

      8864d707d5e91e1c073e5d3bd4324793202449c647b1b1936df35fd734635d4a

    • SHA512

      2f3828bd2525dd8b6cc8daae7e2bcff2ba508c2841eaaf8a0faa359ea9e07f7387bf503c309ece096e6899627d5e9a9c90abf7d197bb8199e4db28b83d03a93c

    • Chaos

      Ransomware family first seen in June 2021.

    • Chaos Ransomware

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies boot configuration data using bcdedit

    • Deletes backup catalog

      Uses wbadmin.exe to inhibit system recovery.

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Sets desktop wallpaper using registry

    • Target

      decrypt-decrypters/Decrypter.exe

    • Size

      218KB

    • MD5

      97f3854d27d9f5d8f9b15818237894d5

    • SHA1

      e608608d59708ef58102a3938d9117fa864942d9

    • SHA256

      fac94a8e02f92d63cfdf1299db27e40410da46c9e86d8bb2cd4b1a0d68d5f7a2

    • SHA512

      25d840a7a6f0e88092e0f852690ed9377cf3f38e0f2c95e74f8b2ffea574d83c6154cccdbf94f1756e2bbdcdb33b5106aab946644dedc4ffaefb6bf57a866696

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Sets desktop wallpaper using registry

    • Target

      decrypt-decrypters/privateKey.chaos

    • Size

      1KB

    • MD5

      ef98e844f401ce505f3cfadd50387a2a

    • SHA1

      53152b609e4c2a5904f55ef4862463c9e97b6840

    • SHA256

      8e1978ba42d685cc1fdbfea65f2c6e6bb08d1a82601c6586c5df2984cb764c40

    • SHA512

      c2483aea1caf32e166456c85dd187cca4d5a7503c9a9194b4e5a0eac2b9762b53385c67e3eb29bab03306144479b6250907202980c494840c468713b143aa7a2

    Score
    1/10
    • Target

      decrypt-decrypters/publicKey.chaos

    • Size

      397B

    • MD5

      52e4bb13a8780d8180b2902b6214a32a

    • SHA1

      f78d461e51897af9a6dbc365031b24aca90def92

    • SHA256

      f29f3c1ab0db20f3550e78eba4a1bcec1dc76cd6df0c1b547d2229a27eb26160

    • SHA512

      3a6d5c8e863676792ec893d2f21f1314c342f294a95607032225bf12dd41f7935528bffcda43775b6059d1c7e0df746e993ca346780bf3822cd30c42ad3f145a

    Score
    1/10

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Defense Evasion

File Deletion

3
T1107

Modify Registry

4
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

2
T1005

Impact

Inhibit System Recovery

4
T1490

Defacement

2
T1491

Tasks