General

  • Target

    702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.bin

  • Size

    211KB

  • Sample

    220913-efb4aaadcm

  • MD5

    b774d0ad0ae7a9d3ec00281bc8682cd2

  • SHA1

    6c8d2b7035721dd184597cfd2864b0afd28d7bd2

  • SHA256

    702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0

  • SHA512

    606dcbfea802773509d30e7de88209a5abe11f89697bdf8dbe92a89252ed4cc9873a64797d19e2cbd71b1a39a6ed06d76a0d59821592d44a6f8a6c9e45bd94eb

  • SSDEEP

    3072:owAJkyMS4a+RQ3dTmx0Tth+cySxE+s9WRhP6v8xZduobdwV:RAJeRQ3dT++GnOR/5bGV

Malware Config

Extracted

Path

C:\readme.txt

Ransom Note
All of your files are currently encrypted by MONTI strain. If you don't know who we are - just "Google it." As you already know, all of your data has been encrypted by our software. It cannot be recovered by any means without contacting our team directly. DON'T TRY TO RECOVER your data by yourselves. Any attempt to recover your data (including the usage of the additional recovery software) can damage your files. However, if you want to try - we recommend choosing the data of the lowest value. DON'T TRY TO IGNORE us. We've downloaded a pack of your internal data and are ready to publish it on our news website if you do not respond. So it will be better for both sides if you contact us as soon as possible. DON'T TRY TO CONTACT feds or any recovery companies. We have our informants in these structures, so any of your complaints will be immediately directed to us. So if you will hire any recovery company for negotiations or send requests to the police/FBI/investigators, we will consider this as a hostile intent and initiate the publication of whole compromised data immediately. To prove that we REALLY CAN get your data back - we offer you to decrypt two random files completely free of charge. You can contact our team directly for further instructions through our website : TOR VERSION : (you should download and install TOR browser first https://torproject.org) http://4s4lnfeujzo67fy2jebz2dxskez2gsqj2jeb35m75ktufxensdicqxad.onion/chat/3194223a728c446ebfb50c494adb674da4d8c5622e124bcca9943f2b9a3f35f7/ YOU SHOULD BE AWARE! We will speak only with an authorized person. It can be the CEO, top management, etc. In case you are not such a person - DON'T CONTACT US! Your decisions and action can result in serious harm to your company! Inform your supervisors and stay calm!
URLs

http://4s4lnfeujzo67fy2jebz2dxskez2gsqj2jeb35m75ktufxensdicqxad.onion/chat/3194223a728c446ebfb50c494adb674da4d8c5622e124bcca9943f2b9a3f35f7/

Targets

    • Target

      702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.bin

    • Size

      211KB

    • MD5

      b774d0ad0ae7a9d3ec00281bc8682cd2

    • SHA1

      6c8d2b7035721dd184597cfd2864b0afd28d7bd2

    • SHA256

      702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0

    • SHA512

      606dcbfea802773509d30e7de88209a5abe11f89697bdf8dbe92a89252ed4cc9873a64797d19e2cbd71b1a39a6ed06d76a0d59821592d44a6f8a6c9e45bd94eb

    • SSDEEP

      3072:owAJkyMS4a+RQ3dTmx0Tth+cySxE+s9WRhP6v8xZduobdwV:RAJeRQ3dT++GnOR/5bGV

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v6

Tasks