General

  • Target

    10744216171.zip

  • Size

    957KB

  • Sample

    230609-dmp32sbe7t

  • MD5

    844119e042920d31a7039f0624fb9e4a

  • SHA1

    b406cd984f8060c8674e8e3487fc99ce9099139b

  • SHA256

    6f940b6d1eb918033db66fb1b8e4936e31ce0d8172ffc682bb1de1d4151d36b1

  • SHA512

    afbc6d8d3d742667b4bed0038f0c8728011c86495326c90147bd3a91aafc3465f2478f2279938158f8fa8b91bec7e4cd5b3323be7878895133c85274b6a21e30

  • SSDEEP

    24576:BCKzEVmmcuIILRLBQx37oXq+uV2le3yux2wgbn:cRVNcdIFLBm37Cur3rRS

Score
10/10

Malware Config

Extracted

Path

/MEag_HOW_TO_DECRYPT.txt

Family

hive

Ransom Note
Your network has been breached and all data were encrypted. Personal data, financial reports and important documents are ready to disclose. To decrypt all the data and to prevent exfiltrated files to be disclosed at http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/ you will need to purchase our decryption software. Please contact our sales department at: http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/ Login: 5mX2Ja7tXTQd Password: 36VFJGoJ6t4qhgbHLXyJ To get an access to .onion websites download and install Tor Browser at: https://www.torproject.org/ (Tor Browser is not related to us) Follow the guidelines below to avoid losing your data: - Do not modify, rename or delete *.key.ndjmu files. Your data will be undecryptable. - Do not modify or rename encrypted files. You will lose them. - Do not report to the Police, FBI, etc. They don't care about your business. They simply won't allow you to pay. As a result you will lose everything. - Do not hire a recovery company. They can't decrypt without the key. They also don't care about your business. They believe that they are good negotiators, but it is not. They usually fail. So speak for yourself. - Do not reject to purchase. Exfiltrated files will be publicly disclosed.
URLs

http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/

http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/

Targets

    • Target

      713b699c04f21000fca981e698e1046d4595f423bd5741d712fd7e0bc358c771

    • Size

      2.3MB

    • MD5

      171d2a50c6d7e69281d1c3ef98d510f2

    • SHA1

      322db4ca435004a127acd4171cc52be9edaf5338

    • SHA256

      713b699c04f21000fca981e698e1046d4595f423bd5741d712fd7e0bc358c771

    • SHA512

      2226d1a5e9c8a2920fa8d327b53e10f135e9b30c8c3d1e7fbb3a59a51df782f106f41f60ad8140a1de4a81ef6b230418126ffb24bd75eab3c3a298ada2f58913

    • SSDEEP

      49152:bC9tUNrb/T7vO90dL3BmAFd4A64nsfJcm9M3YJIpgfDVw0ksgg778GzvyKYUcTD1:bzcM4IyEWyKP

    Score
    10/10
    • Hive

      A ransomware written in Golang first seen in June 2021.

    • Deletes itself

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Reads CPU attributes

    • Reads hardware information

      Accesses system info like serial numbers, manufacturer names etc.

    • Reads network interface configuration

      Fetches information about one or more active network interfaces.

MITRE ATT&CK Enterprise v6

Tasks