General
-
Target
3a08e3bfec2db5dbece359ac9662e65361a8625a0122e68b56cd5ef3aedf8ce1.zip
-
Size
838KB
-
Sample
230507-gd5nxsdd47
-
MD5
c23290fd235c9ba39871719bfb2edf37
-
SHA1
c0ba227219b9c41576e444c86bf61ed3f108e12e
-
SHA256
9ebef9a4746e0eb9469e5605ea523415bb97b3f72345815d46ff1a216652dd89
-
SHA512
d4b2a6dbc97f574a611c442d758210ee4e3aaba21828d0016cc2fbb40a1999c47a6c98b14d02855c0d22b49733fb369d849234afa61685d5d5676b13ab255521
-
SSDEEP
24576:+WoPsQDVZFXewKX7JWf3XeHH2L8qyeQscAp+T3zy3:+PDLZed7gf3Xen2L8cQscACj4
Behavioral task
behavioral1
Sample
3a08e3bfec2db5dbece359ac9662e65361a8625a0122e68b56cd5ef3aedf8ce1.elf
Resource
ubuntu1804-amd64-20221125-en
Malware Config
Extracted
blackcat
-
enable_network_discovery
true
-
enable_self_propagation
true
-
enable_set_wallpaper
true
-
extension
nnvjxgy
-
note_file_name
RECOVER-${EXTENSION}-FILES.txt
-
note_full_text
>> What happened? Important files on your network was ENCRYPTED and now they have "${EXTENSION}" extension. In order to recover your files you need to follow instructions below. >> Sensitive Data Sensitive data on your system was DOWNLOADED. If you DON'T WANT your sensitive data to be PUBLISHED you have to act quickly. Data includes: - Employees personal data, CVs, DL, SSN. - Complete network map including credentials for local and remote services. - Private financial information including: clients data, bills, budgets, annual reports, bank statements. - Manufacturing documents including: datagrams, schemas, drawings in solidworks format - And more... >> CAUTION DO NOT MODIFY ENCRYPTED FILES YOURSELF. DO NOT USE THIRD PARTY SOFTWARE TO RESTORE YOUR DATA. YOU MAY DAMAGE YOUR FILES, IT WILL RESULT IN PERMANENT DATA LOSS. >> What should I do next? Follow these simple steps to get everything back to normal: 1) Download and install Tor Browser from: https://torproject.org/ 2) Navigate to: http://xqoykemmcivwtpxh3a6pu3w7sstr2y7hapxdiv4caaxidurmwwbjx2id.onion/?access-key=${ACCESS_KEY}
Targets
-
-
Target
3a08e3bfec2db5dbece359ac9662e65361a8625a0122e68b56cd5ef3aedf8ce1.elf
-
Size
1.8MB
-
MD5
92ed8739cfb9132c8b57016e3c071a28
-
SHA1
362aa21546904629b28a56c9d5c4bfd3b53296f5
-
SHA256
3a08e3bfec2db5dbece359ac9662e65361a8625a0122e68b56cd5ef3aedf8ce1
-
SHA512
755cab9f92d9bb39b1afc890e6d220f1e9ff884bb5c9ab9a526dd7af204fa88c21d88fb2c153c28eb577a5730548dca3ad8ffa20d3b31ed3fb550fce98f7c3d3
-
SSDEEP
49152:IqeL+lTdKGwpizjdRVdjezCFvw9b28vXUG3ao3tGbK:Iqe0/FdjezChlbK
Score5/10-
Reads runtime system information
Reads data from /proc virtual filesystem.
-