Resubmissions

07/11/2022, 20:55 UTC

221107-zqtrashbg3 10

07/11/2022, 18:05 UTC

221107-wphe4adeaj 10

General

  • Target

    2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618

  • Size

    49KB

  • Sample

    221107-zqtrashbg3

  • MD5

    f9c31d3d243a5e6b7e9cf69cdf83426a

  • SHA1

    0781bfd34b3b72e7e520800c23fc133ce4aff069

  • SHA256

    2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618

  • SHA512

    eaf57defc88e9103794c22f3bd686835c9689a40cc18bd0affe4fdae536aea7403c25be9c3a8e2b301e33ff0a4c8ce91756f1c74833fbf6e5c79d820a673fcfe

  • SSDEEP

    768:aaQRffPB31aCytHLykiKPT3JATD2qBwV2ckjbnsb0Ah99De0YAD+eg0LBYL91Oe:aam318HxZATvnsblYO+eE

Score
10/10

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\1044975534\+README-WARNING+.txt

Ransom Note
::: Greetings ::: Little FAQ: .1. Q: Whats Happen? A: Your files have been encrypted. The file structure was not damaged, we did everything possible so that this could not happen. .2. Q: How to recover files? A: If you wish to decrypt your files you will need to pay us. .3. Q: What about guarantees? A: Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will cooperate with us. Its not in our interests. To check the ability of returning files, you can send to us any 2 files with SIMPLE extensions(jpg,xls,doc, etc... not databases!) and low sizes(max 1 mb), we will decrypt them and send back to you. That is our guarantee. .4. Q: How to contact with you? A: You can write us to our mailboxes: emonster@onionmail.org or emonster@msgsafe.io .5. Q: How will the decryption process proceed after payment? A: After payment we will send to you our scanner-decoder program and detailed instructions for use. With this program you will be able to decrypt all your encrypted files. .6. Q: If I don�t want to pay bad people like you? A: If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause only we have the private key. In practice - time is much more valuable than money. :::BEWARE::: DON'T try to change encrypted files by yourself! If you will try to use any third party software for restoring your data or antivirus solutions - please make a backup for all encrypted files! Any changes in encrypted files may entail damage of the private key and, as result, the loss all data.
Emails

emonster@onionmail.org

emonster@msgsafe.io

Targets

    • Target

      2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618

    • Size

      49KB

    • MD5

      f9c31d3d243a5e6b7e9cf69cdf83426a

    • SHA1

      0781bfd34b3b72e7e520800c23fc133ce4aff069

    • SHA256

      2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618

    • SHA512

      eaf57defc88e9103794c22f3bd686835c9689a40cc18bd0affe4fdae536aea7403c25be9c3a8e2b301e33ff0a4c8ce91756f1c74833fbf6e5c79d820a673fcfe

    • SSDEEP

      768:aaQRffPB31aCytHLykiKPT3JATD2qBwV2ckjbnsb0Ah99De0YAD+eg0LBYL91Oe:aam318HxZATvnsblYO+eE

    Score
    10/10
    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Deletes backup catalog

      Uses wbadmin.exe to inhibit system recovery.

    • Legitimate hosting services abused for malware hosting/C2

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.