General

  • Target

    7883f01096db9bcf090c2317749b6873036c27ba92451b212b8645770e1f0b8a.zip

  • Size

    265KB

  • Sample

    230720-zdl6pabb6s

  • MD5

    e3560fa0155667654e6a4e02aa836503

  • SHA1

    773f9393350cd76d06fe0acaa365ec34696f834a

  • SHA256

    43b90eae52e1b1033cc89a654145dc201938953c1a55e331e20df0591c4fa496

  • SHA512

    e389eec145d47983792003c469171ce0f4b9791384af910c3794ae2e54be6cb77ae0d910bc4aa5fa28d6472a742bb087bdcd68d59ee86127fd71bd4f0787d61b

  • SSDEEP

    6144:n76GcpuSj7to/biPDIORw/t221GIb2DOCUQoGd3Scgi2RCdsH3y:zu7to/bSDIOClXsLOCpMli24j

Malware Config

Extracted

Path

C:\Program Files\readme.txt

Ransom Note
Your data are stolen and encrypted The data will be published on TOR website if you do not pay the ransom You can contact us and decrypt one file for free on this TOR site (you should download and install TOR browser first https://torproject.org) https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion:80/ Your company id for log in: ba7a7058-3531-4b67-bae6-d602e9110361
URLs

https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion:80/

Targets

    • Target

      7883f01096db9bcf090c2317749b6873036c27ba92451b212b8645770e1f0b8a.exe

    • Size

      543KB

    • MD5

      998022b70d83c6de68e5bdf94e0f8d71

    • SHA1

      b87a947f3e85701fcdadd733e9b055a65a3b1308

    • SHA256

      7883f01096db9bcf090c2317749b6873036c27ba92451b212b8645770e1f0b8a

    • SHA512

      2744b77f951bd2bb34b094dd3b54fcf8f7dca76e03c745809edc045749c814c7d88c9ddd69ad684a1c156716afae76b5ebec3f932d0f2a72b242878134f65647

    • SSDEEP

      12288:M1DTMHixr1moQqUiXINDl/m1s6BQio67VlA:AzmoQqUiXw2s6yiVx

    • Black Basta

      A ransomware family targeting Windows and Linux ESXi first seen in February 2022.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (10854) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks