General

  • Target

    72a227944381ff99d3fb517adb3b223da51daf440f32e8424bb1462e05f733d6

  • Size

    850KB

  • Sample

    221127-w658gsde5v

  • MD5

    4d101f5c395dc8bb9b841fce0be4ba16

  • SHA1

    296e6ec78fe672ba6a65ed1f5612d572b0acc02b

  • SHA256

    72a227944381ff99d3fb517adb3b223da51daf440f32e8424bb1462e05f733d6

  • SHA512

    db1a9b8d86659f79ea5ad1f3fe0b3b4b0c45a91da2d7e03198837ee8dc25b16f4fb7f38470c9f7bd76a672100c4678122e695e49a221beeb57db96e35db9a06b

  • SSDEEP

    24576:u5cdMc0r+M1+TQ1n/49IjDOcCaLNiYT0hUej9XvTC:umdMtV+TQlhO2UhUM9rC

Score
10/10

Malware Config

Extracted

Path

C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\!Decrypt-All-Files-drhbmzk.txt

Ransom Note
Your documents, photos, databases and other important files have been encrypted with strongest encryption and unique key, generated for this computer. Private decryption key is stored on a secret Internet server and nobody can decrypt your files until you pay and obtain the private key. If you see the main locker window, follow the instructions on the locker. Overwise, it's seems that you or your antivirus deleted the locker program. Now you have the last chance to decrypt your files. Open http://6ubux6ppafr24izl.onion.cab or http://6ubux6ppafr24izl.tor2web.org in your browser. They are public gates to the secret server. If you have problems with gates, use direct connection: 1. Download Tor Browser from http://torproject.org 2. In the Tor Browser open the http://6ubux6ppafr24izl.onion/ Note that this server is available via Tor Browser only. Retry in 1 hour if site is not reachable. Copy and paste the following public key in the input form on server. Avoid missprints. UWO2HD2-DIWUV3V-B2DVS3B-NRORMAJ-W7LPJOE-GDX5GE2-U4Q3VWO-BA4F3CI LQSUHNS-7HAV56C-YYWOZO7-GB3P6Z5-N3STIYI-BUVAZMV-D5PAG3Q-WSEAZRI BAADARG-OYAZZHT-QUPL7RB-KNXCBS6-W2YKCHT-7KFD2UI-KCXONGU-4NKTN7G Follow the instructions on the server.
URLs

http://6ubux6ppafr24izl.onion.cab

http://6ubux6ppafr24izl.tor2web.org

http://6ubux6ppafr24izl.onion/

Targets

    • Target

      72a227944381ff99d3fb517adb3b223da51daf440f32e8424bb1462e05f733d6

    • Size

      850KB

    • MD5

      4d101f5c395dc8bb9b841fce0be4ba16

    • SHA1

      296e6ec78fe672ba6a65ed1f5612d572b0acc02b

    • SHA256

      72a227944381ff99d3fb517adb3b223da51daf440f32e8424bb1462e05f733d6

    • SHA512

      db1a9b8d86659f79ea5ad1f3fe0b3b4b0c45a91da2d7e03198837ee8dc25b16f4fb7f38470c9f7bd76a672100c4678122e695e49a221beeb57db96e35db9a06b

    • SSDEEP

      24576:u5cdMc0r+M1+TQ1n/49IjDOcCaLNiYT0hUej9XvTC:umdMtV+TQlhO2UhUM9rC

    Score
    10/10
    • CTB-Locker

      Ransomware family which uses Tor to hide its C2 communications.

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

MITRE ATT&CK Matrix

Tasks