General

  • Target

    3b43751ed88e4d1f82cf52ca2d4477e3e35c35f08c1b4e3ab21c80720601e804.zip

  • Size

    26KB

  • Sample

    221129-1ts5lsef8t

  • MD5

    9bfb49abbfea8f5f8b89f2f377e973e1

  • SHA1

    9acb987a295ab88ded9b20ab8cdb97c0ecdc0734

  • SHA256

    d797482ed6fe513a2ac858d65ac214a91b285b1fb23723a69964bc3e963c40d6

  • SHA512

    8d37831f0ce25a061046a08e80619c593cc098595c6aa38e71aa1a9ae6efc264770b33d5c988fe75a748ac68a63bfa1415ac84e99ff7a683bbede6435d10afe9

  • SSDEEP

    384:tyr6WV+4uJIIcdFeTUQGlyiJeFn8VEsfkxvU1Kl5YsKpzN6VSvu9rJUP8XHuoWHD:s7VTDPDAN2ywKoTpp64veZH51HDhe+i

Malware Config

Extracted

Path

C:\Users\Public\Documents\!$R4GN4R_EB839F13$!.txt

Family

ragnarlocker

Ransom Note
***************************************************************************************************************** HELLO mapfree.com ! IF YOU ARE READING THIS, IT'S MEAN YOUR DATA WAS ENCRYPTED AND YOU SENSITIVE PRIVATE INFORMATION WAS STOLEN! READ CAREFULLY THE WHOLE INSTRUCTION NOTES TO AVOID DIFFICULTIES WITH YOUR DATA by RAGNAR_LOCKER ! ***************************************************************************************************************** *YOU HAVE TO CONTACT US via LIVE CHAT IMMEDIATELY TO RESOLVE THIS CASE AND MAKE A DEAL* (contact information you will find at the bottom of this notes) !!!!! WARNING !!!!! DO NOT Modify, rename, copy or move any files or you can DAMAGE them and decryption will be impossible. DO NOT Use any third-party or public Decryption software, it also may DAMAGE files. DO NOT Shutdown or Reset your system, it can DAMAGE files ------------------------------------- There is ONLY ONE possible way to get back your files - contact us via LIVE CHAT and pay for the special DECRYPTION KEY ! For your GUARANTEE we will decrypt 2 of your files FOR FREE, to show that it Works. Don't waste your TIME, the link for contact us will be deleted if there is no contact made in closest time and you will NEVER restore your DATA. !!! HOWEVER if you will contact us within 2 day since get penetrated - you can get a very SPECIAL PRICE. ! WARNING ! Whole your network was fully COMPROMISED! We BREACHED your security perimeter and get ACCESS to your PRIVATE SENSITIVE Data, including your Insuranse cases, Financial reports, Business audit reports, Non-Disclosure Agreements, Confidential files, DataBase files, Administrators directories and etc.! Also we have access to corporate correspondence, personal information about your clients and even more about your partners and your staff. - There are some screenshots just as a proofs of what we got on you. Screenshots: http://prnt.sc/tz6u6u http://prnt.sc/tz6uq9 http://prnt.sc/tz6uz9 http://prnt.sc/tz6w7x http://prnt.sc/tzoumv ------------------------------------- Whole data that gathered from your private files and directories could be published in MASS MEDIA for BREAKING NEWS! Yours partners, clients and investors would be notified about LEAK, the consequences will have a DISASTROUS effect on your company's STOCK PRICES! However if we make a deal everything would be kept in secret and all your data will be restored, so it is much cheaper and easier way than lawsuits expenses for you. You can take a look for some more examples of what we have, right now it's a private, temporary and hidden page, but it could become permanent and accessable for Public View if you decide NOT pay. Use Tor Browser to open the link: http://p6o7m73ujalhgkiv.onion/?J0gYIisP3R7m to view the page's content use password: mNn36C6GOf ============================================================================================================== ! HERE IS THE SIMPLE MANUAL HOW TO GET CONTACT WITH US VIA LIVE CHAT ! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! a) Download and install TOR browser from this site : https://torproject.org b) For contact us via LIVE CHAT open our website : http://rgngerzxui2kizq6h5ekefneizmn54n4bcjjthyvdir22orayuya5zad.onion/client/?E5AddcB5e33bF83b3e3e23ef7fD9Dc28eAe4CA0f2D0992AC4d688A35eB5c543F c) To visit our NEWS LEAK BLOG with your data, open this website : http://p6o7m73ujalhgkiv.onion/?J0gYIisP3R7m ( password: mNn36C6GOf ) d) If Tor is restricted in your area, use VPN When you open LIVE CHAT website follow rules : Follow the instructions on the website. At the top you will find CHAT tab. Send your message there and wait for response (we are not online 24/7, So you have to wait for your turn). *********************************************************************************** ---BEGIN KEY R_R--- RTVBZGRjQjVlMzNiRjgzYjNlM2UyM2VmN2ZEOURjMjhlQWU0Q0EwZjJEMDk5MkFDNGQ2ODhBMzVlQjVjNTQzRg== ---END KEY R_R--- ***********************************************************************************
URLs

http://prnt.sc/tz6u6u

http://prnt.sc/tz6uq9

http://prnt.sc/tz6uz9

http://prnt.sc/tz6w7x

http://prnt.sc/tzoumv

http://p6o7m73ujalhgkiv.onion/?J0gYIisP3R7m

http://rgngerzxui2kizq6h5ekefneizmn54n4bcjjthyvdir22orayuya5zad.onion/client/?E5AddcB5e33bF83b3e3e23ef7fD9Dc28eAe4CA0f2D0992AC4d688A35eB5c543F

Targets

    • Target

      3b43751ed88e4d1f82cf52ca2d4477e3e35c35f08c1b4e3ab21c80720601e804.exe

    • Size

      54KB

    • MD5

      439ef1ddf569a7d6a8280a229357fcfc

    • SHA1

      c1a5dfd851337cd12770244c97e83b7066dea781

    • SHA256

      3b43751ed88e4d1f82cf52ca2d4477e3e35c35f08c1b4e3ab21c80720601e804

    • SHA512

      fe4c2a55135f065af8733a1eeb9904353b7279f44ecb8732c58067d4b15f03c5c15d10857994943e785c35a688ca2ee9f333abf3a6dca80542d651be6b77e75e

    • SSDEEP

      768:gDq17yBfcKW/engJIYVQIz2yNVn/+Q7tXZ70OSWas5Y:MqM6/OgS4Qs3F7tJ7nSW55

    • RagnarLocker

      Ransomware first seen at the end of 2019, which has been used in targetted attacks against multiple companies.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies boot configuration data using bcdedit

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Bootkit

1
T1067

Defense Evasion

File Deletion

2
T1107

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

3
T1082

Impact

Inhibit System Recovery

3
T1490

Tasks