General

  • Target

    7769606121.zip

  • Size

    71KB

  • Sample

    220724-s8cgeahehn

  • MD5

    4e6f3ed15b2679235aee27281ca717b4

  • SHA1

    6959fea57cc0e5d3ed7629f9bf20e424167648f6

  • SHA256

    562b6736cb6b1abff6a98c29059ae0f6de997d9f3137de622c92f217510519a4

  • SHA512

    dbd98bec47b539e5998148e1cf3c20a716ed2c0ed1ef4d604a84bb0bfcaebeb208bdfbd5d32479502b6af7c01679d3a472fa40683fc519fb16f7c8daf44f1920

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\!TXDOT_READ_ME!.txt

Ransom Note
Greetings, Texas Department of Transportation! Read this message CAREFULLY and contact someone from IT department. Your files are securely ENCRYPTED. No third party decryption software EXISTS. MODIFICATION or RENAMING encrypted files may cause decryption failure. You can send us an encrypted file (not greater than 400KB) and we will decrypt it FOR FREE, so you have no doubts in possibility to restore all files from all affected systems ANY TIME. Encrypted file SHOULD NOT contain sensitive information (technical, backups, databases, large documents). The rest of data will be available after the PAYMENT. Infrastructure rebuild will cost you MUCH more. Contact us ONLY if you officially represent the whole affected network. The ONLY attachments we accept are non archived encrypted files for test decryption. Speak ENGLISH when contacting us. Mail us: [email protected] We kindly ask you not to use GMAIL, YAHOO or LIVE to contact us. The PRICE depends on how quickly you do it. �

Targets

    • Target

      e55fcf9315c52d2abd3431f7e4bb82cbd2b0d24d124e0e1a27b951030b2de162

    • Size

      156KB

    • MD5

      ca2326886fa699068c44f32b3e51adaf

    • SHA1

      3555aaebe6c113fb8f923a38cb3bd75da6e86277

    • SHA256

      e55fcf9315c52d2abd3431f7e4bb82cbd2b0d24d124e0e1a27b951030b2de162

    • SHA512

      d7da00f22fede4909c29d5c6125f2b5749453cefa65c262133d50cf7235fc9d3b134e5b2d5740f08e8db3fc70c21de8bed42deb84a5ca31108a7968026b7ed9e

    • Deletes NTFS Change Journal

      The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.

    • RansomEXX Ransomware

      Targeted ransomware with variants which affect Windows and Linux systems.

    • Clears Windows event logs

    • Modifies boot configuration data using bcdedit

    • Deletes backup catalog

      Uses wbadmin.exe to inhibit system recovery.

    • Disables use of System Restore points

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Overwrites deleted data with Cipher tool

      Cipher is a Windows tool which be used to securely wipe deallocated HDD space, preventing recovery of deleted data.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks