General

  • Target

    2023-05-08_5110c4c4b4836d926be20f95c973ab29_darkside

  • Size

    147KB

  • Sample

    230509-dh9a5afh2w

  • MD5

    5110c4c4b4836d926be20f95c973ab29

  • SHA1

    2ab4e2829e05e7217bbb0039e68ff1d80aa661be

  • SHA256

    063fcedd3089e3cea8a7e07665ae033ba765b51a6dc1e7f54dde66a79c67e1e7

  • SHA512

    c35e56627f00fb8571a0ee756da416115680c5712fd370bbfeb5193d04ddbac57b8cbcff0659239b643f56bfc77831ed676c3d9257ee097a1d5eb5e210e08d69

  • SSDEEP

    3072:46glyuxE4GsUPnliByocWepeVyrPCTsAF/Gg:46gDBGpvEByocWebrK

Malware Config

Extracted

Path

C:\fxkJts2wg.README.txt

Ransom Note
----------- [ Welcome to buhtiRansom ] -------------> What happend? ---------------------------------------------- Your files are encrypted. We use strong encryption algorithms, so you cannot decrypt your data. But you can restore everything by purchasing a special program from us - universal decryptor. This program will restore all your files. Follow our instructions below and you will recover all your data. What guarantees? ---------------------------------------------- We value our reputation. If we do not do our work and liabilities, nobody will pay us. This is not in our interests. All our decryption software is perfectly tested and will decrypt your data. How to get access? ---------------------------------------------- Using a browser: 1) Open website: https://satoshidisk.com/pay/CIGsph 2) Enter valid email to receive download link after payment. 3) Pay amount to Bitcoin address. 4) Receive email link to the download page. 5) Decrypt instruction included. !!! DANGER !!! DO NOT MODIFY or try to RECOVER any files yourself. It WILL NOT be able to RESTORE. !!! DANGER !!!
URLs

https://satoshidisk.com/pay/CIGsph

Targets

    • Target

      2023-05-08_5110c4c4b4836d926be20f95c973ab29_darkside

    • Size

      147KB

    • MD5

      5110c4c4b4836d926be20f95c973ab29

    • SHA1

      2ab4e2829e05e7217bbb0039e68ff1d80aa661be

    • SHA256

      063fcedd3089e3cea8a7e07665ae033ba765b51a6dc1e7f54dde66a79c67e1e7

    • SHA512

      c35e56627f00fb8571a0ee756da416115680c5712fd370bbfeb5193d04ddbac57b8cbcff0659239b643f56bfc77831ed676c3d9257ee097a1d5eb5e210e08d69

    • SSDEEP

      3072:46glyuxE4GsUPnliByocWepeVyrPCTsAF/Gg:46gDBGpvEByocWebrK

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks