General

  • Target

    sample-604995-339165f63aec8d7fd7798129d0fc68ad.zip

  • Size

    229KB

  • Sample

    220525-2rm19aefd9

  • MD5

    84d2df993ecc1d772411758180a426db

  • SHA1

    323f84604434cd4f120e1b938aa113e7dff5106b

  • SHA256

    8880aa3c00150fb4a6745b59b33c71dd6246b61309e81a15d8f6350616adfbd9

  • SHA512

    8675e1e4471dfc23b02351b918ac0993e0c1cecde53e6fb70f3816f0b93fec88f6988e965c51bd9f7b8fbc1620f36bf91ae296c1bcc8680e53099d99604a7b4f

Malware Config

Extracted

Family

mespinoza

Attributes
  • ransomnote

    Hi Company, Every byte on any types of your devices was encrypted. Don't try to use backups because it were encrypted too. To get all your data back contact us: [email protected] [email protected] -------------- FAQ: 1. Q: How can I make sure you don't fooling me? A: You can send us 2 files(max 2mb). 2. Q: What to do to get all data back? A: Don't restart the computer, don't move files and write us. 3. Q: What to tell my boss? A: Protect Your System Amigo.

Targets

    • Target

      W71my1HtQm.exe

    • Size

      499KB

    • MD5

      339165f63aec8d7fd7798129d0fc68ad

    • SHA1

      07f594333ca9db110bbee37a9643988f4cc22933

    • SHA256

      0f0014669bc10a7d87472cafc05301c66516857607b920ddeb3039f4cb8f0a50

    • SHA512

      5ef9dbe0f29397adf00f0c4ace8f90fd0aba9a0c2016cecff02f68bcef5781bc5dcd32c18d9b54cc8025581ec6494990dd472cdd36c394637799907e5cc55e3b

    • Mespinoza Ransomware

      Also known as Pysa. Ransomware-as-a-servoce which first appeared in 2020.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks