General

  • Target

    f83fb9ce6a83da58b20685c1d7e1e546.zip

  • Size

    417KB

  • Sample

    230110-nxsxssbf5v

  • MD5

    a024e1d53d75eaefc4aa74131ff16fd8

  • SHA1

    cfd053a7e793ec84ec78679f224b417c760e0a5e

  • SHA256

    77b2731ff3c7a14b8b962ea387c41293415b3478e73973888851991105777560

  • SHA512

    f1418a512f8603bf99b40e61e7fe61c7228f814544da3b00adf24ab93b246e522a3c6a6a74476df8419fa54fa3a78f62ebcaaa539daa0de0e111a0beeb129c42

  • SSDEEP

    12288:6Zr2Dvm+2LDF+jgcz5jCDiIuexi3FBUzvASSB7d:6ZCDvmRLDwjPrIuekUz4SS5

Malware Config

Extracted

Path

C:\DECRYPT-FILES.html

Ransom Note
<html> <head> <script> function CopyToClipboard(containerid) { if (document.selection) { var range = document.body.createTextRange(); range.moveToElementText(document.getElementById(containerid)); range.select().createTextRange(); document.execCommand("copy"); } else if (window.getSelection) { var range = document.createRange(); range.selectNode(document.getElementById(containerid)); window.getSelection().addRange(range); document.execCommand("copy"); alert("Base64 copied into the clipboard!") } } </script> <style> html{ margin:0; padding:0; width:100%; height:100%; } body { background: #000000; color: #ececec; font-family: Consolas }; .tooltip { position: relative; display: inline-block; border-bottom: 1px dotted black; } .tooltip .tooltiptext { visibility: hidden; width: 120px; background-color: #555; color: #fff; text-align: center; border-radius: 6px; padding: 5 px 0; position: absolute; z-index: 1; bottom: 125%; left: 50%; margin-left: -60px; opacity: 0; transition: opacity 0.3s; } .tooltip .tooltiptext::after { content: ""; position: absolute; top: 100%; left: 50%; margin-left: -5px; border-width: 5px; border-style: solid; border-color: #555 transparent transparent transparent; } .tooltip:hover .tooltiptext { visibility: visible; opacity: 1; } p#base64{ -ms-word-break: break-all; word-break: break-all; -webkit-hyphens: auto; -moz-hyphens: auto; -ms-hyphens: auto; hyphens: auto; } p#base64:hover{ cursor: hand; } </style> </head> <body> <table style="position: absolute;" width="100%"> <tr> <td style="width: 25%;"> <td style="width: 50%;"> <div style="text-align: center; font-size: 20px;"> <p><b>Maze ransomware</b></p> <p>*********************************************************************************************************************</p> <p>Attention! Your documents, photos, databases, and other important files have been encrypted!</p> <p>*********************************************************************************************************************</p> </div> <div style="text-align: center; font-size: 18px;"> <p><b>What is going on?</b><br>Your files have been encrypted using strong reliable algorithms RSA-2048 and ChaCha20 with an unique private key for your system</p> <p>You can read more about this cryptosystem here: <a href=https://en.wikipedia.org/wiki/RSA_(cryptosystem)>https://en.wikipedia.org/wiki/RSA_(cryptosystem)</a></p> <p>The only way to recover (decrypt) your files is to buy decryptor with the unique private key</p> <p><u>Attention! Only we can recover your files! If someone tell you that he can do this, kindly ask him to proof!</u></p> <p>By us you can decrypt one of your files for free as a proof of work that we have the method to decrypt the rest of your data.</p> <p>In order to either buy the private key or make test decryption contact us via email: <br> <u><b>Main e-mail: [email protected]<br>Reserve e-mail: [email protected]</b></u> <p>Remember to hurry up as email address may not be available for very long as soon as law enforcements of different countries always trying to seize emails used in ransom companies <p>If you are willing to pay but you are not sure knock us and we will save your e-mail address. In case the listed addresses are seized we will write you from the new one</p> <p>Below you will see a big base64 blob, you will need to email us and copy this blob to us.<br>you can click on it, and it will be copied into the clipboard.</p> <p>If you have troubles copying it, just send us the file you are currently reading, as an attachment.</p> <p>Base64: </p> </div><div style="text-align: center; font-size: 12px;"><p id="base64" onclick="return CopyToClipboard('base64')" class="tooltip">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<span class="tooltiptext">Click here to copy</span></p></div></td><td style="width: 25%; text-align: right;"></tr></table></body></html>
Emails

[email protected]<br>Reserve

[email protected]</b></u>

Extracted

Path

C:\DECRYPT-FILES.html

Ransom Note
<html> <head> <script> function CopyToClipboard(containerid) { if (document.selection) { var range = document.body.createTextRange(); range.moveToElementText(document.getElementById(containerid)); range.select().createTextRange(); document.execCommand("copy"); } else if (window.getSelection) { var range = document.createRange(); range.selectNode(document.getElementById(containerid)); window.getSelection().addRange(range); document.execCommand("copy"); alert("Base64 copied into the clipboard!") } } </script> <style> html{ margin:0; padding:0; width:100%; height:100%; } body { background: #000000; color: #ececec; font-family: Consolas }; .tooltip { position: relative; display: inline-block; border-bottom: 1px dotted black; } .tooltip .tooltiptext { visibility: hidden; width: 120px; background-color: #555; color: #fff; text-align: center; border-radius: 6px; padding: 5 px 0; position: absolute; z-index: 1; bottom: 125%; left: 50%; margin-left: -60px; opacity: 0; transition: opacity 0.3s; } .tooltip .tooltiptext::after { content: ""; position: absolute; top: 100%; left: 50%; margin-left: -5px; border-width: 5px; border-style: solid; border-color: #555 transparent transparent transparent; } .tooltip:hover .tooltiptext { visibility: visible; opacity: 1; } p#base64{ -ms-word-break: break-all; word-break: break-all; -webkit-hyphens: auto; -moz-hyphens: auto; -ms-hyphens: auto; hyphens: auto; } p#base64:hover{ cursor: hand; } </style> </head> <body> <table style="position: absolute;" width="100%"> <tr> <td style="width: 25%;"> <td style="width: 50%;"> <div style="text-align: center; font-size: 20px;"> <p><b>Maze ransomware</b></p> <p>*********************************************************************************************************************</p> <p>Attention! Your documents, photos, databases, and other important files have been encrypted!</p> <p>*********************************************************************************************************************</p> </div> <div style="text-align: center; font-size: 18px;"> <p><b>What is going on?</b><br>Your files have been encrypted using strong reliable algorithms RSA-2048 and ChaCha20 with an unique private key for your system</p> <p>You can read more about this cryptosystem here: <a href=https://en.wikipedia.org/wiki/RSA_(cryptosystem)>https://en.wikipedia.org/wiki/RSA_(cryptosystem)</a></p> <p>The only way to recover (decrypt) your files is to buy decryptor with the unique private key</p> <p><u>Attention! Only we can recover your files! If someone tell you that he can do this, kindly ask him to proof!</u></p> <p>By us you can decrypt one of your files for free as a proof of work that we have the method to decrypt the rest of your data.</p> <p>In order to either buy the private key or make test decryption contact us via email: <br> <u><b>Main e-mail: [email protected]<br>Reserve e-mail: [email protected]</b></u> <p>Remember to hurry up as email address may not be available for very long as soon as law enforcements of different countries always trying to seize emails used in ransom companies <p>If you are willing to pay but you are not sure knock us and we will save your e-mail address. In case the listed addresses are seized we will write you from the new one</p> <p>Below you will see a big base64 blob, you will need to email us and copy this blob to us.<br>you can click on it, and it will be copied into the clipboard.</p> <p>If you have troubles copying it, just send us the file you are currently reading, as an attachment.</p> <p>Base64: </p> </div><div style="text-align: center; font-size: 12px;"><p id="base64" onclick="return CopyToClipboard('base64')" class="tooltip">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<span class="tooltiptext">Click here to copy</span></p></div></td><td style="width: 25%; text-align: right;"></tr></table></body></html>
Emails

[email protected]<br>Reserve

[email protected]</b></u>

Targets

    • Target

      e8a091a84dd2ea7ee429135ff48e9f48f7787637ccb79f6c3eb42f34588bc684.exe

    • Size

      473KB

    • MD5

      f83fb9ce6a83da58b20685c1d7e1e546

    • SHA1

      01c459b549c1c2a68208d38d4ba5e36d29212a4f

    • SHA256

      e8a091a84dd2ea7ee429135ff48e9f48f7787637ccb79f6c3eb42f34588bc684

    • SHA512

      934ec9073a28b90e8df785bef49f224789da59f83729208b92dba0503e2894b3f48ed04b20de1ba49374b1cd26f0c87e8e5ab79e817258135e3be2c171f3f396

    • SSDEEP

      12288:v6l/7FpnaeoQbRLBYdunMCayql4YcQD+AgJbAWgjbgpQ:CDna43YAKl4Yci+AggEpQ

    • Maze

      Ransomware family also known as ChaCha.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks