Resubmissions

31-03-2023 23:22

230331-3cpf7sff7w 7

31-03-2023 21:30

230331-1cv8mseh6x 10

General

  • Target

  • Size

    84KB

  • Sample

    230331-1cv8mseh6x

  • MD5

    9d15a3b314600b4c08682b0202700ee7

  • SHA1

    208e79cdb96328d5929248bb8a4dd622cf0684d1

  • SHA256

    3ab3833e31e4083026421c641304369acfd31b957b78af81f3c6ef4968ef0e15

  • SHA512

    9916397b782aaafa68eb6a781ea9a0db27f914035dd586142c818ccbd7e69036896767bedba97489d5100de262a554cf14bcdf4a24edda2c5d37217b265398d3

  • SSDEEP

    1536:vpeW2JCTz5eDMn1Wi8N36flDRdHOjN0O02SHU00wCpEbE1PDai41lkgD:xH2JCTz5mmYoDRdHOB0O3d00wiEY134D

Malware Config

Extracted

Path

C:\Program Files\7-Zip\Lang\DECRYPT_YOUR_FILES.HTML

Ransom Note
<html> <head> <style> body{ background-color: #3366CC; } h1 { background-color: RGB(249, 201, 16); } p { background-color: maroon; color: white; } </style> </head> <body> <center> <h1><b> Attention ! All your files </b> have been encrypted. </h1></br> <p> Due encrypting was used algoritm RSA-4096 and AES-256, used for protection military secrets.</br> That means > RESTORE YOU DATA POSIBLE ONLY BUYING decryption passwords from us.</br> Getting a decryption of your files is - SIMPLY task.</br></br> That all what you need:</br> 1. Sent Your ID_KEY on mailbox [email protected] or [email protected] </br> 2. For test, decrypt 2 small files, to be sure that we can decrypt you files.</br> 3. Pay our services. </br> 4. GET software with passwords for decrypt you files.</br> 5. Make measures to prevent this type situations again.</br></br> IMPORTANT(1)</br> Do not try restore files without our help, this is useless, and can destroy you data permanetly.</br></br> IMPORTANT(2) </br> We Cant hold you decryption passwords forever. </br>ALL DECRYPTION PASSWORDS, for what wasn`t we receive reward, will destroy after week of moment of encryption. </p> <p> Your ID_KEY: <br> </p> <table width="1024" border="0"> <tbody> <tr> <td><p>EP1pdeXqNjEk/xNS42IZATAHZjlFcedYij4S2U0WHb4wTj93XP8G0tZOicpWIIT5frjAqI1/SSRhh5OJiWrjJZcCJTLSEKgHAYCoumB1iSlZUiiUWoDmxX/M1RfvzL1RyPXWMmlk6SIEqbswuHJbWwpRd1xzWHC3MYkU3LV4yXc8kShXQiKggyf8xRQJPFYlLBmW0RE+LT4YOoePHkj+6D58lD6hk9XilR+wTHEGgBQYYMcFL7JXa9m6G88mbgrmnQZ2KneMnpXuO5sUIHJ/RwjHbHuFIRrzEIQKV49APom7v+aG3tO4Ks0lLOJRUT6sl2OXSC9jhixyII7x9xF/Mg==ZW4tVVM=</p></td> </tr> </tbody> </table> </center></html></body>

Targets

    • Target

    • Size

      84KB

    • MD5

      9d15a3b314600b4c08682b0202700ee7

    • SHA1

      208e79cdb96328d5929248bb8a4dd622cf0684d1

    • SHA256

      3ab3833e31e4083026421c641304369acfd31b957b78af81f3c6ef4968ef0e15

    • SHA512

      9916397b782aaafa68eb6a781ea9a0db27f914035dd586142c818ccbd7e69036896767bedba97489d5100de262a554cf14bcdf4a24edda2c5d37217b265398d3

    • SSDEEP

      1536:vpeW2JCTz5eDMn1Wi8N36flDRdHOjN0O02SHU00wCpEbE1PDai41lkgD:xH2JCTz5mmYoDRdHOB0O3d00wiEY134D

    • Fantom

      Ransomware which hides encryption process behind fake Windows Update screen.

    • Disables Task Manager via registry modification

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Target

      out.upx

    • Size

      241KB

    • MD5

      e3f41be419e9d47dd3fcab16d7f2beeb

    • SHA1

      1193ba0e8c3cdd603e7f6c3cd5bab4e738a37db5

    • SHA256

      986967e8d0ff9f4e4029fe1ca3fa8bbc294089ae00deb0965b8c8d447d03f662

    • SHA512

      fd618233a8a49edde8bdde327dbf893cdca91c1a6f65ba4651fb77b484118d84bec93ff0962d41e5fc50178e3c6a1bae4e8e7082d87f3997e51a239233a2fd4d

    • SSDEEP

      3072:A+xuRz0TFo/X10Q6T/bql41lkgDR/X10Q6T:HTFo/Fm/H15DR/Fm

    Score
    3/10

MITRE ATT&CK Enterprise v6

Tasks