General

  • Target

    b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe_JC.exe

  • Size

    169KB

  • Sample

    230918-xcwydsec23

  • MD5

    98562209465bec53327e65649a2b8829

  • SHA1

    3a47656ed3df213bd934aa01078a863568fe9f2b

  • SHA256

    b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe

  • SHA512

    c11ce14f9cb75df2bc9bd81971c1f8fa885815715f389eb8e796e0f657de59756b36a6f896c216a03c7be7bb3ddff9b8a47aee71146760e4f4d9c6bdc0ff2cc3

  • SSDEEP

    3072:iFgiMd04bHHr/QFDtaruNyXgs7WL61fXbEiVkYELY2P+gA/PF:UE3bHL/ngsu61kYELNmhF

Malware Config

Extracted

Path

C:\Users\Admin\Documents\!!Read_Me.56322.html

Ransom Note
<!DOCTYPE html><h1>#ALL YOUR FILES ARE ENCRYPTED AND STOLEN BY RAGNAROK</h1>Dear Sir<br><br>Your files are encrypted with RSA4096 and AES encryption algorithm. <br>But don't worry, you can return all your files!! follow the instructions to recover your files <br><br>Cooperate with us and get the decrypter program as soon as possible will be your best solution.<br>Only our software can decrypt all your encrypted files.<br><br>What guarantees you have?<br>We take our reputation seriously. We reject any form of deception</br>You can send one of your encrypted file from your PC and we decrypt it for free. <br>But we can decrypt only 1 file for free. File must not contain any valuable information.<br>When hiring third-party negotiators or recovery companies. listen to what they tell you. try to think.<br> Are they really interested in solving your problems or are they just thinking about their profit and ambitions?<br><br>By the way.We have stolen lots of your company and your private data which includes doc,xls,pdf,jpg,mdf,sql,pst...<br>Here we upload sample files of your company and your private data on our blog :<br>http://wobpitin77vdsdiswr43duntv6eqw4rvphedutpaxycjdie6gg3binad.onion<br>We promise that if you don't pay within a week, we will package and publish all of your company and your data on our website.<br>We also promise we can decrypt all of your data and delete all your files on internet after your payment.<br>Such leaks of information lead to losses for the company. fines and lawsuits. And don't forget that information can fall into the hands of competitors!<br>For us this is just business and to prove to you our seriousness.<br><br>Our e-mail:<br> [email protected]<br><br> Reserve e-mail:<br>[email protected]<br>[email protected]<br><br>Device ID:<br> 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
Emails

[email protected]<br><br>

e-mail:<br>[email protected]<br>[email protected]<br><br>Device

Extracted

Path

C:\Users\Admin\Favorites\!!Read_Me.C16A8.html

Ransom Note
<!DOCTYPE html><h1>#ALL YOUR FILES ARE ENCRYPTED AND STOLEN BY RAGNAROK</h1>Dear Sir<br><br>Your files are encrypted with RSA4096 and AES encryption algorithm. <br>But don't worry, you can return all your files!! follow the instructions to recover your files <br><br>Cooperate with us and get the decrypter program as soon as possible will be your best solution.<br>Only our software can decrypt all your encrypted files.<br><br>What guarantees you have?<br>We take our reputation seriously. We reject any form of deception</br>You can send one of your encrypted file from your PC and we decrypt it for free. <br>But we can decrypt only 1 file for free. File must not contain any valuable information.<br>When hiring third-party negotiators or recovery companies. listen to what they tell you. try to think.<br> Are they really interested in solving your problems or are they just thinking about their profit and ambitions?<br><br>By the way.We have stolen lots of your company and your private data which includes doc,xls,pdf,jpg,mdf,sql,pst...<br>Here we upload sample files of your company and your private data on our blog :<br>http://wobpitin77vdsdiswr43duntv6eqw4rvphedutpaxycjdie6gg3binad.onion<br>We promise that if you don't pay within a week, we will package and publish all of your company and your data on our website.<br>We also promise we can decrypt all of your data and delete all your files on internet after your payment.<br>Such leaks of information lead to losses for the company. fines and lawsuits. And don't forget that information can fall into the hands of competitors!<br>For us this is just business and to prove to you our seriousness.<br><br>Our e-mail:<br> [email protected]<br><br> Reserve e-mail:<br>[email protected]<br>[email protected]<br><br>Device ID:<br> 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
Emails

[email protected]<br><br>

e-mail:<br>[email protected]<br>[email protected]<br><br>Device

Targets

    • Target

      b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe_JC.exe

    • Size

      169KB

    • MD5

      98562209465bec53327e65649a2b8829

    • SHA1

      3a47656ed3df213bd934aa01078a863568fe9f2b

    • SHA256

      b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe

    • SHA512

      c11ce14f9cb75df2bc9bd81971c1f8fa885815715f389eb8e796e0f657de59756b36a6f896c216a03c7be7bb3ddff9b8a47aee71146760e4f4d9c6bdc0ff2cc3

    • SSDEEP

      3072:iFgiMd04bHHr/QFDtaruNyXgs7WL61fXbEiVkYELY2P+gA/PF:UE3bHL/ngsu61kYELNmhF

    • Locky

      Ransomware strain released in 2016, with advanced features like anti-analysis.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies boot configuration data using bcdedit

    • Renames multiple (137) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Renames multiple (149) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Modifies Windows Firewall

    • Deletes itself

MITRE ATT&CK Enterprise v15

Tasks