General

  • Target

    HEUR-Trojan-Ransom.MSIL.Thanos.gen-9d85a74f073c4403e3a91017b6757e0368139e672498a2f84f5efaad0d1b573b.exe

  • Size

    123KB

  • Sample

    220924-lm7xvsbaa8

  • MD5

    14de196b28bc12b5e571ea8303668041

  • SHA1

    7f400d518bd716e75c795de47e1dc67f9d29d582

  • SHA256

    9d85a74f073c4403e3a91017b6757e0368139e672498a2f84f5efaad0d1b573b

  • SHA512

    1fe6f312057ca6debe2552f02c231cacff60f79fc40c053c26500f58fe4575fd4c820883bb4203ead2e9db00402883389d72853f304d3e198a333ef49e387b6f

  • SSDEEP

    3072:RdvedgwAwp9orNJUq11rfAEVMjOPsn94+fmVnj/:b4gnxMjO+9tfmVj

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\RESTORE_FILES_INFO.txt

Family

prometheus

Ransom Note
YOUR COMPANY NETWORK HAS BEEN HACKED All your important files have been encrypted! Your files are safe! Only modified.(AES) No software available on internet can help you. We are the only ones able to decrypt your files. -------------------------------------------------------------------------------- We also gathered highly confidential/personal data. These data are currently stored on a private server. Files are also encrypted and stored securely. -------------------------------------------------------------------------------- As a result of working with us, you will receive: Fully automatic decryptor, all your data will be recovered within a few hours after it's run. Server with your data will be immediately destroyed after your payment. Save time and continue working. You will can send us 2-3 non-important files and we will decrypt it for free to prove we are able to give your files back. -------------------------------------------------------------------------------- !!!!!!!!!!!!!!!!!!!!!!!! If you decide not to work with us: All data on your computers will remain encrypted forever. YOUR DATA ON OUR SERVER AND WE WILL RELEASE YOUR DATA TO PUBLIC OR RE-SELLER! So you can expect your data to be publicly available in the near future.. The price will increase over time. !!!!!!!!!!!!!!!!!!!!!!!!! -------------------------------------------------------------------------------- It doesn't matter to us what you choose. We only seek money and our goal is not to damage your reputation or prevent your business from running. Write to us now and we will provide the best prices. Instructions for contacting us: 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site. 2. Press "Download Tor", then press "Download Tor Browser Bundle", install it. 3. Open the Tor browser. Copy the link http://promethw27cbrcot.onion/ticket.php?track=54Z-YAD-AWLD and paste it in the Tor browser. 7. Start a chat and follow the further instructions. Attention! Any attempt to restore your files with third-party software will corrupt it. Modify or rename files will result in a loose of data. If you decide to try anyway, make copies before that Key Identifier: FCtdunF000TBDXMLrjefwYWo34Ze+RZ0wrbZ+rhyFjdGcgELBXOYXpnA4FN3U7pJS75o9RTT5nnbxqaN//1zdVlVKKDcZqxSNoZaYXXYIX3FrcxRq/ooUuHGvpfv7XylmmAXVfxrZb4ri4qzLT5K7atdRBpaA/QMhrf0TR6LhpM3wV9MV4eG+4tqZ37U++RqpKsW4aTdPXHttmvXP40DOVsMm6pkZamXn1H2M1AKvOeuIgNpkWgAW51vJJfIzUw3wp2nTs+0XD6tW1qiVub9bMwR6kF7gMQ8IZnqNA6cjRhCcS0iu2xI4ic1UgPueUUi3q5NuJmbzHeao0aXGfHJfsP5X7R8NgKnonX8LFAMIWrAU8rlxBLP7vpFjvzGOMGf4Pg/R7VTs5ZgNUrx9V5z0+SoinLxOx+3+NPyL7E52MsjJHg1QatatejQhp1cY95X0bdEfMoxAZmh05Qd7TIWYe+Z5vne6Jk6wtZj8tP6nhFLyfrXiDEWQfLfF0fijR8smEuMI/+JSuD0A5tvVevuWrCrdVVF1JfgkdCvgEO/S2E1pkj5dVtj1Aqd6OXQPbkBFAnVEeSt/RaoJW2XWGedgJGYWXu1jVSCLzcBOh5fku8II33J/UOxhc66ghg2XTzkm5c1r8B+q5DjLLKVhqZ4XO2Ti/Fa4WSRi7/YoWy/zxI=
URLs

http://promethw27cbrcot.onion/ticket.php?track=54Z-YAD-AWLD

Extracted

Path

C:\Users\Admin\Desktop\RESTORE_FILES_INFO.hta

Family

prometheus

Ransom Note
YOUR COMPANY NETWORK HAS BEEN HACKED All your important files have been encrypted! Your files are safe! Only modified.(AES) No software available on internet can help you. We are the only ones able to decrypt your files. We also gathered highly confidential/personal data. These data are currently stored on a private server. Files are also encrypted and stored securely. As a result of working with us, you will receive: Fully automatic decryptor, all your data will be recovered within a few hours after it’s installation. Server with your data will be immediately destroyed after your payment. Save time and continue working. You will can send us 2-3 non-important files and we will decrypt it for free to prove we are able to give your files back. If you decide not to work with us: All data on your computers will remain encrypted forever. YOUR DATA ON OUR SERVER AND WE WILL RELEASE YOUR DATA TO PUBLIC OR RE-SELLER! So you can expect your data to be publicly available in the near future.. The price will increase over time. It doesn't matter to us what you choose. We only seek money and our goal is not to damage your reputation or prevent your business from running. Write to us now and we will provide the best prices. Instructions for contacting us: 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site. 2. Press "Download Tor", then press "Download Tor Browser Bundle", install it. 3. Open the Tor browser. Copy the link http://promethw27cbrcot.onion/ticket.php?track=54Z-YAD-AWLD and paste it in the Tor browser. 7. Start a chat and follow the further instructions. Attention! Any attempt to restore your files with third-party software will corrupt it. Modify or rename files will result in a loose of data. If you decide to try anyway, make copies before that Key Identifier: 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
URLs

http://promethw27cbrcot.onion/ticket.php?track=54Z-YAD-AWLD

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\RESTORE_FILES_INFO.txt

Family

prometheus

Ransom Note
YOUR COMPANY NETWORK HAS BEEN HACKED All your important files have been encrypted! Your files are safe! Only modified.(AES) No software available on internet can help you. We are the only ones able to decrypt your files. -------------------------------------------------------------------------------- We also gathered highly confidential/personal data. These data are currently stored on a private server. Files are also encrypted and stored securely. -------------------------------------------------------------------------------- As a result of working with us, you will receive: Fully automatic decryptor, all your data will be recovered within a few hours after it's run. Server with your data will be immediately destroyed after your payment. Save time and continue working. You will can send us 2-3 non-important files and we will decrypt it for free to prove we are able to give your files back. -------------------------------------------------------------------------------- !!!!!!!!!!!!!!!!!!!!!!!! If you decide not to work with us: All data on your computers will remain encrypted forever. YOUR DATA ON OUR SERVER AND WE WILL RELEASE YOUR DATA TO PUBLIC OR RE-SELLER! So you can expect your data to be publicly available in the near future.. The price will increase over time. !!!!!!!!!!!!!!!!!!!!!!!!! -------------------------------------------------------------------------------- It doesn't matter to us what you choose. We only seek money and our goal is not to damage your reputation or prevent your business from running. Write to us now and we will provide the best prices. Instructions for contacting us: 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site. 2. Press "Download Tor", then press "Download Tor Browser Bundle", install it. 3. Open the Tor browser. Copy the link http://promethw27cbrcot.onion/ticket.php?track=54Z-YAD-AWLD and paste it in the Tor browser. 7. Start a chat and follow the further instructions. Attention! Any attempt to restore your files with third-party software will corrupt it. Modify or rename files will result in a loose of data. If you decide to try anyway, make copies before that Key Identifier: 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
URLs

http://promethw27cbrcot.onion/ticket.php?track=54Z-YAD-AWLD

Extracted

Path

C:\Users\Admin\Desktop\RESTORE_FILES_INFO.hta

Family

prometheus

Ransom Note
YOUR COMPANY NETWORK HAS BEEN HACKED All your important files have been encrypted! Your files are safe! Only modified.(AES) No software available on internet can help you. We are the only ones able to decrypt your files. We also gathered highly confidential/personal data. These data are currently stored on a private server. Files are also encrypted and stored securely. As a result of working with us, you will receive: Fully automatic decryptor, all your data will be recovered within a few hours after it’s installation. Server with your data will be immediately destroyed after your payment. Save time and continue working. You will can send us 2-3 non-important files and we will decrypt it for free to prove we are able to give your files back. If you decide not to work with us: All data on your computers will remain encrypted forever. YOUR DATA ON OUR SERVER AND WE WILL RELEASE YOUR DATA TO PUBLIC OR RE-SELLER! So you can expect your data to be publicly available in the near future.. The price will increase over time. It doesn't matter to us what you choose. We only seek money and our goal is not to damage your reputation or prevent your business from running. Write to us now and we will provide the best prices. Instructions for contacting us: 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site. 2. Press "Download Tor", then press "Download Tor Browser Bundle", install it. 3. Open the Tor browser. Copy the link http://promethw27cbrcot.onion/ticket.php?track=54Z-YAD-AWLD and paste it in the Tor browser. 7. Start a chat and follow the further instructions. Attention! Any attempt to restore your files with third-party software will corrupt it. Modify or rename files will result in a loose of data. If you decide to try anyway, make copies before that Key Identifier: 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
URLs

http://promethw27cbrcot.onion/ticket.php?track=54Z-YAD-AWLD

Targets

    • Target

      HEUR-Trojan-Ransom.MSIL.Thanos.gen-9d85a74f073c4403e3a91017b6757e0368139e672498a2f84f5efaad0d1b573b.exe

    • Size

      123KB

    • MD5

      14de196b28bc12b5e571ea8303668041

    • SHA1

      7f400d518bd716e75c795de47e1dc67f9d29d582

    • SHA256

      9d85a74f073c4403e3a91017b6757e0368139e672498a2f84f5efaad0d1b573b

    • SHA512

      1fe6f312057ca6debe2552f02c231cacff60f79fc40c053c26500f58fe4575fd4c820883bb4203ead2e9db00402883389d72853f304d3e198a333ef49e387b6f

    • SSDEEP

      3072:RdvedgwAwp9orNJUq11rfAEVMjOPsn94+fmVnj/:b4gnxMjO+9tfmVj

    • Prometheus Ransomware

      Ransomware family mostly targeting manufacturing industry and claims to be affiliated with REvil.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Drops startup file

    • Modifies file permissions

    • Modifies WinLogon

MITRE ATT&CK Enterprise v6

Tasks