General

  • Target

    9184909867.zip

  • Size

    69KB

  • Sample

    230217-fhgl8adg86

  • MD5

    723dbc2f209fc467e1567eefaf62a2ca

  • SHA1

    2190f47a0861d11fd95c07834e9d0742db3c04c5

  • SHA256

    95ddbaafda43cb3957fea2e32fc8efc9917cdc52035d3b550ebbd29b855e25fb

  • SHA512

    c3aeedda08d681143ce32305f51b2ec4629b40d30104530c00207ce3fafe5c0fb8ebc39d7ef32d9ff20f5b8df5984140825f1268ba924102e59063aed93164f7

  • SSDEEP

    1536:ozDai+ghUHUDjyb3ZAp7fN8VTXQpKBMf4j5D+dCkVCfQgIZcd34eF1n:ix+ghU0Xi32J2103f4jlQJqbIY42

Malware Config

Extracted

Path

C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta

Ransom Note
YOUR FILES ARE ENCRYPTED Don't worry,you can return all your files! If you want to restore them, follow this link: email decryptex@airmail.cc YOUR ID If you have not been answered via the link within 12 hours, write to us by e-mail: dex.dex.tuta.io Attention! Do not rename encrypted files. Do not try to decrypt your data using third party software, it may cause permanent data loss. Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.
Emails

decryptex@airmail.cc

Targets

    • Target

      e181fb2c45e278661fbbf3fe9b4878e3d7bcee0873d7e1132e3808f10d3e4875

    • Size

      92KB

    • MD5

      9dfcd5165fcbf89e319ceca3f5077490

    • SHA1

      32fb887ad469eecfaeb66ff98d73da0edd9a7adc

    • SHA256

      e181fb2c45e278661fbbf3fe9b4878e3d7bcee0873d7e1132e3808f10d3e4875

    • SHA512

      4e417f5ac6898bfe60c772270df06e14a452c1a731558a2e334ae1b09acd5928a042d3f17b07b86e773a559c4f173ec022015d4442062b4f53df8bb194356a7d

    • SSDEEP

      1536:mBwl+KXpsqN5vlwWYyhY9S4Ai5KS18YgmeMQq1NQDrorHikgd2ZLj:Qw+asqN5aW/hLqKS183iNyrorHi

    • Dharma

      Dharma is a ransomware that uses security software installation to hide malicious activities.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

2
T1107

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Impact

Inhibit System Recovery

2
T1490

Tasks