General

  • Target

    W71my1HtQm.exe

  • Size

    499KB

  • Sample

    220525-2tc9tsaegm

  • MD5

    339165f63aec8d7fd7798129d0fc68ad

  • SHA1

    07f594333ca9db110bbee37a9643988f4cc22933

  • SHA256

    0f0014669bc10a7d87472cafc05301c66516857607b920ddeb3039f4cb8f0a50

  • SHA512

    5ef9dbe0f29397adf00f0c4ace8f90fd0aba9a0c2016cecff02f68bcef5781bc5dcd32c18d9b54cc8025581ec6494990dd472cdd36c394637799907e5cc55e3b

Malware Config

Extracted

Family

mespinoza

Attributes
  • ransomnote

    Hi Company, Every byte on any types of your devices was encrypted. Don't try to use backups because it were encrypted too. To get all your data back contact us: [email protected] [email protected] -------------- FAQ: 1. Q: How can I make sure you don't fooling me? A: You can send us 2 files(max 2mb). 2. Q: What to do to get all data back? A: Don't restart the computer, don't move files and write us. 3. Q: What to tell my boss? A: Protect Your System Amigo.

Targets

    • Target

      W71my1HtQm.exe

    • Size

      499KB

    • MD5

      339165f63aec8d7fd7798129d0fc68ad

    • SHA1

      07f594333ca9db110bbee37a9643988f4cc22933

    • SHA256

      0f0014669bc10a7d87472cafc05301c66516857607b920ddeb3039f4cb8f0a50

    • SHA512

      5ef9dbe0f29397adf00f0c4ace8f90fd0aba9a0c2016cecff02f68bcef5781bc5dcd32c18d9b54cc8025581ec6494990dd472cdd36c394637799907e5cc55e3b

    • Mespinoza Ransomware

      Also known as Pysa. Ransomware-as-a-servoce which first appeared in 2020.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks