General

  • Target

    844119e042920d31a7039f0624fb9e4a.bin

  • Size

    957KB

  • Sample

    230610-b4dp8sef8w

  • MD5

    a6dac4ddc180628ba8a444e52b3a0a99

  • SHA1

    387e743a21a58dba61d1cb5318070eeb8a93ecc1

  • SHA256

    b5492f77cbc3c2bde85a226f1f47198f2f06f3f02dbe2408a77fd4550021e0ca

  • SHA512

    e91faba85606b0bc7c162eab7cf52b53c68e18e94c9a0a8ddedaf583e6bb3aab21f35d84d9417981c0ce6e793e18f86bd577c61288bae33578e01ce083024ed4

  • SSDEEP

    24576:KweFw284WebkfqQd340Z4qGhMjTXaoEgnIOjQCz0NwNhyr:oeEpgfq25KKWoXITY0mvw

Score
10/10

Malware Config

Extracted

Path

/MEag_HOW_TO_DECRYPT.txt

Family

hive

Ransom Note
Your network has been breached and all data were encrypted. Personal data, financial reports and important documents are ready to disclose. To decrypt all the data and to prevent exfiltrated files to be disclosed at http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/ you will need to purchase our decryption software. Please contact our sales department at: http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/ Login: 5mX2Ja7tXTQd Password: 36VFJGoJ6t4qhgbHLXyJ To get an access to .onion websites download and install Tor Browser at: https://www.torproject.org/ (Tor Browser is not related to us) Follow the guidelines below to avoid losing your data: - Do not modify, rename or delete *.key.ndjmu files. Your data will be undecryptable. - Do not modify or rename encrypted files. You will lose them. - Do not report to the Police, FBI, etc. They don't care about your business. They simply won't allow you to pay. As a result you will lose everything. - Do not hire a recovery company. They can't decrypt without the key. They also don't care about your business. They believe that they are good negotiators, but it is not. They usually fail. So speak for yourself. - Do not reject to purchase. Exfiltrated files will be publicly disclosed.
URLs

http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/

http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/

Targets

    • Target

      713b699c04f21000fca981e698e1046d4595f423bd5741d712fd7e0bc358c771

    • Size

      2.3MB

    • MD5

      171d2a50c6d7e69281d1c3ef98d510f2

    • SHA1

      322db4ca435004a127acd4171cc52be9edaf5338

    • SHA256

      713b699c04f21000fca981e698e1046d4595f423bd5741d712fd7e0bc358c771

    • SHA512

      2226d1a5e9c8a2920fa8d327b53e10f135e9b30c8c3d1e7fbb3a59a51df782f106f41f60ad8140a1de4a81ef6b230418126ffb24bd75eab3c3a298ada2f58913

    • SSDEEP

      49152:bC9tUNrb/T7vO90dL3BmAFd4A64nsfJcm9M3YJIpgfDVw0ksgg778GzvyKYUcTD1:bzcM4IyEWyKP

    Score
    10/10
    • Hive

      A ransomware written in Golang first seen in June 2021.

    • Deletes itself

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Reads CPU attributes

    • Reads hardware information

      Accesses system info like serial numbers, manufacturer names etc.

    • Reads network interface configuration

      Fetches information about one or more active network interfaces.

MITRE ATT&CK Enterprise v6

Tasks