General

  • Target

    01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe

  • Size

    79KB

  • Sample

    230425-wa5xvaca46

  • MD5

    f9afb31bc17811e5ab4fa406f105b1fe

  • SHA1

    d1a9449dcc8a3aa0c887bce71f128866175f679a

  • SHA256

    01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f

  • SHA512

    6feca3dfa221b704208754e67bcdce02a2253961da098b3e376d11217cd00b9f77e42f37f242e1a1f4b759b5fd172c29c9f153fce32eace48e07e802aff40b55

  • SSDEEP

    1536:SX6UhZM4hubesrQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG2zs4:uhZ5YesrQLOJgY8Zp8LHD4XWaNH71dLI

Malware Config

Extracted

Path

C:\Users\Admin\Contacts\How To Restore Your Files.txt

Family

darkside

Ransom Note
----------- [ Hello! ] -------------> ****BY BABUK LOCKER**** What happend? ---------------------------------------------- Your computers and servers are encrypted, backups are deleted from your network and copied. We use strong encryption algorithms, so you cannot decrypt your data. But you can restore everything by purchasing a special program from us - a universal decoder. This program will restore your entire network. Follow our instructions below and you will recover all your data. If you continue to ignore this for a long time, we will start reporting the hack to mainstream media and posting your data to the dark web. What guarantees? ---------------------------------------------- We value our reputation. If we do not do our work and liabilities, nobody will pay us. This is not in our interests. All our decryption software is perfectly tested and will decrypt your data. We will also provide support in case of problems. We guarantee to decrypt one file for free. How to contact us? ---------------------------------------------- Using EMAIL: 1) Open your mail 2) Write us: chaos88888@protonmail.com backup address: anttnchf@mailfence.com restore.bab.yk@rambler.ru TO SEND TO THE EMAIL ONLY PERSONAL ID!!! YOUR PERSONAL ID, ATTACH IT: beRv79st1xwM9NTHA1NluiebVXTdr4FS0eRnD5W9wMjAqbKQctyvdxbYuZ8e !!! DANGER !!! DO NOT MODIFY or try to RECOVER any files yourself. We WILL NOT be able to RESTORE them. !!! DANGER !!!
Emails

chaos88888@protonmail.com

anttnchf@mailfence.com

restore.bab.yk@rambler.ru

Targets

    • Target

      01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.bin.exe

    • Size

      79KB

    • MD5

      f9afb31bc17811e5ab4fa406f105b1fe

    • SHA1

      d1a9449dcc8a3aa0c887bce71f128866175f679a

    • SHA256

      01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f

    • SHA512

      6feca3dfa221b704208754e67bcdce02a2253961da098b3e376d11217cd00b9f77e42f37f242e1a1f4b759b5fd172c29c9f153fce32eace48e07e802aff40b55

    • SSDEEP

      1536:SX6UhZM4hubesrQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG2zs4:uhZ5YesrQLOJgY8Zp8LHD4XWaNH71dLI

    • Babuk Locker

      RaaS first seen in 2021 initially called Vasa Locker.

    • DarkSide

      Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

File Deletion

2
T1107

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Impact

Inhibit System Recovery

2
T1490

Tasks