Static task
static1
Behavioral task
behavioral1
Sample
Help.hta
Resource
win7-20230712-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
Help.hta
Resource
win10v2004-20230703-en
0 signatures
150 seconds
General
-
Target
Help.zip
-
Size
1KB
-
MD5
77dbc3aaf751a2753fb187462c1a48a4
-
SHA1
a512563f06142db862045c6c7c13677ceff06c4d
-
SHA256
ccb7e7a3ca15e087fe830cbe7cb083dcbd07cc92eeca3be3010ecd1511315acf
-
SHA512
c95caf96b5b63e80a848c50de7a624e726869ff705cd7ac330c3c085e3dfc626f4c2d33b7f5f2e56164ada3c015c877516ec0f4712a48f4e0852c623f9a0cbc0
Score
10/10
Malware Config
Extracted
Ransom Note
FILES ARE ENCRYPTED
All your files were encrypted and important data was copied to our storageIf you want to recover files, contact the operator in the TOX application, enter YOUR ID Add the ID of your personal operator as a friend so that you can start chatting.If the Operator did not respond within 24 hours or encountered any problem then send an email to our support In the header of the letter, indicate your ID and attach 2-3 infected files to generate a private key and compile the decryptorFiles should not have important information and should not exceed the size of more than 5 MBAfter receiving the ransom, we will send a recovery tool with detailed instructions within an hour and delete your files from our storages
Attention Do not rename encrypted files.
Do not try to decrypt your data using third party software, it may cause permanent data loss.
If you refuse to pay the ransom, Important Data that contains personal confidential information or trade secrets will be sold to third parties interested in them.In any case, we will receive a payment, and your company will face problems in law enforcement and judicial areas.
Signatures
Files
-
Help.zip.zip
-
Help.hta.hta .vbs