General

  • Target

    e26bd11c525dfca4152ed74b2fb97e5c30a091239c2dbe877a312a1cfcf34004

  • Size

    820KB

  • Sample

    221128-tvqbsagf35

  • MD5

    53efb689f9f56262b571f68b11a21839

  • SHA1

    0d31c13c910cbb2dd2979a3762a9223aa12eceee

  • SHA256

    e26bd11c525dfca4152ed74b2fb97e5c30a091239c2dbe877a312a1cfcf34004

  • SHA512

    f7c2723cee0b9d8db1f910e852d4e66f2a10de0710a106676b4f1a07cd6e8e49987d1cac9b30007014f9f8e108d0baccdbca2b7ce4ff863a09570851b9cbf43b

  • SSDEEP

    24576:0tkyyQSspmUheMMyo+g7d9TEE4Zm36B5qbN8:0vSspFeMMDbd1F6BY

Score
10/10

Malware Config

Extracted

Path

C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\!Decrypt-All-Files-inlglmn.txt

Ransom Note
Your documents, photos, databases and other important files have been encrypted with strongest encryption and unique key, generated for this computer. Private decryption key is stored on a secret Internet server and nobody can decrypt your files until you pay and obtain the private key. If you see the main locker window, follow the instructions on the locker. Overwise, it's seems that you or your antivirus deleted the locker program. Now you have the last chance to decrypt your files. Open http://onja764ig6vah2jo.onion.cab or http://onja764ig6vah2jo.tor2web.org in your browser. They are public gates to the secret server. If you have problems with gates, use direct connection: 1. Download Tor Browser from http://torproject.org 2. In the Tor Browser open the http://onja764ig6vah2jo.onion/ Note that this server is available via Tor Browser only. Retry in 1 hour if site is not reachable. Copy and paste the following public key in the input form on server. Avoid missprints. VO6XTIE-PPIWRDN-Z3GQVVE-CUDBL2F-HW7LWCR-UJZW6B6-KSKG36J-JNGEUIC J3DWLNQ-QYEKEEN-CWP5FS2-LXF5GIR-WBB37MU-O4T3AGE-WLP4J45-7LA6ED2 N5NBCNS-AYUQCLE-HSYPGZ2-OA23ORO-CS45AZG-QJNKANF-TYR2XDA-HEGIGDT Follow the instructions on the server.
URLs

http://onja764ig6vah2jo.onion.cab

http://onja764ig6vah2jo.tor2web.org

http://onja764ig6vah2jo.onion/

Extracted

Path

C:\Users\Admin\Documents\!Decrypt-All-Files-inlglmn.txt

Ransom Note
Your documents, photos, databases and other important files have been encrypted with strongest encryption and unique key, generated for this computer. Private decryption key is stored on a secret Internet server and nobody can decrypt your files until you pay and obtain the private key. If you see the main locker window, follow the instructions on the locker. Overwise, it's seems that you or your antivirus deleted the locker program. Now you have the last chance to decrypt your files. Open http://onja764ig6vah2jo.onion.cab or http://onja764ig6vah2jo.tor2web.org in your browser. They are public gates to the secret server. If you have problems with gates, use direct connection: 1. Download Tor Browser from http://torproject.org 2. In the Tor Browser open the http://onja764ig6vah2jo.onion/ Note that this server is available via Tor Browser only. Retry in 1 hour if site is not reachable. Copy and paste the following public key in the input form on server. Avoid missprints. VO6XTIE-PPIWRDN-Z3GQVVE-CUDBL2F-HW7LWCR-UJZW6B6-KSKG36J-JNGEUIC J3DWLNQ-QYEKEEN-CWP5FS2-LXF5GIR-WBB37MU-O4T3AGE-WLP4J45-7LA6ED2 N5NBCNS-AYUQCLE-HSYPGZ2-OA23ORO-CS45BKG-27NKANF-TYR2XDA-HEGIEYO Follow the instructions on the server.
URLs

http://onja764ig6vah2jo.onion.cab

http://onja764ig6vah2jo.tor2web.org

http://onja764ig6vah2jo.onion/

Targets

    • Target

      e26bd11c525dfca4152ed74b2fb97e5c30a091239c2dbe877a312a1cfcf34004

    • Size

      820KB

    • MD5

      53efb689f9f56262b571f68b11a21839

    • SHA1

      0d31c13c910cbb2dd2979a3762a9223aa12eceee

    • SHA256

      e26bd11c525dfca4152ed74b2fb97e5c30a091239c2dbe877a312a1cfcf34004

    • SHA512

      f7c2723cee0b9d8db1f910e852d4e66f2a10de0710a106676b4f1a07cd6e8e49987d1cac9b30007014f9f8e108d0baccdbca2b7ce4ff863a09570851b9cbf43b

    • SSDEEP

      24576:0tkyyQSspmUheMMyo+g7d9TEE4Zm36B5qbN8:0vSspFeMMDbd1F6BY

    Score
    10/10
    • CTB-Locker

      Ransomware family which uses Tor to hide its C2 communications.

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks