Resubmissions
29-09-2023 00:56
230929-bal5hsgd72 10Analysis
-
max time kernel
188s -
max time network
192s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
29-09-2023 00:56
Behavioral task
behavioral1
Sample
40f57275721bd74cc59c0c59c9f98c8e0d1742b7ae86a46e83e985cc4039c3a5.exe
Resource
win10-20230915-en
General
-
Target
40f57275721bd74cc59c0c59c9f98c8e0d1742b7ae86a46e83e985cc4039c3a5.exe
-
Size
3.3MB
-
MD5
71b0db75ae00efd006068d7fff5992cb
-
SHA1
6d4b8e97981c8cd290a487d6080d1b96f3b5496a
-
SHA256
40f57275721bd74cc59c0c59c9f98c8e0d1742b7ae86a46e83e985cc4039c3a5
-
SHA512
060370e0f69697a95eb428c8a708160b81d569aa4f1a28716e94106c673d30eaf9fd82cd49dcf89d34a59f7a2a9ece0602f9671e159233cd056bb891ec98bc95
-
SSDEEP
98304:VAnCs8pVblGyNM+l4UxUc1BhFDvww1MxIa:V+MJ4yumxUcPvwMG
Malware Config
Extracted
blackcat
- Username:
CREDITONE\Administrator - Password:
K3ny@2009
- Username:
CREDITONE\bexec - Password:
CloneD1sk4Song$%
- Username:
CREDITONE\KLarry - Password:
Kl..2021
- Username:
CREDITONE\BKuhl - Password:
Gromit2021!
- Username:
CREDITONE\rlopez - Password:
Victoria7856!
- Username:
CREDITONE\EJaramilla - Password:
1LoveVeros4
- Username:
.\Administrator - Password:
$fiji12$
-
enable_network_discovery
true
-
enable_self_propagation
true
-
enable_set_wallpaper
true
-
extension
7954i9r
-
note_file_name
RECOVER-${EXTENSION}-FILES.txt
-
note_full_text
>> Introduction Important files on your system was ENCRYPTED and now they have have "${EXTENSION}" extension. In order to recover your files you need to follow instructions below. >> Sensitive Data Sensitive data on your system was DOWNLOADED and it will be PUBLISHED if you refuse to cooperate. Data includes: - Employees personal data, CVs, DL, SSN. - Complete network map including credentials for local and remote services. - Financial information including clients data, bills, budgets, annual reports, bank statements. - Complete datagrams/schemas/drawings for manufacturing in solidworks format - And more... Private preview is published here: http://alphvmmm27o3abo3r2mlmjrpdmzle3rykajqc5xsj7j7ejksbpsa36ad.onion/336eb50d-ebf8-436b-937d-ec075de46e7f/419ef3f950d9f346cf86db56db453539dcd51567ea871728e78dbc9918c7efeb >> CAUTION DO NOT MODIFY FILES YOURSELF. DO NOT USE THIRD PARTY SOFTWARE TO RESTORE YOUR DATA. YOU MAY DAMAGE YOUR FILES, IT WILL RESULT IN PERMANENT DATA LOSS. YOUR DATA IS STRONGLY ENCRYPTED, YOU CAN NOT DECRYPT IT WITHOUT CIPHER KEY. >> Recovery procedure Follow these simple steps to get in touch and recover your data: 1) Download and install Tor Browser from: https://torproject.org/ 2) Navigate to: http://sty5r4hhb5oihbq2mwevrofdiqbgesi66rvxr5sr573xgvtuvr4cs5yd.onion/?access-key=${ACCESS_KEY}
Signatures
-
BlackCat
A Rust-based ransomware sold as RaaS first seen in late 2021.
Processes
-
C:\Users\Admin\AppData\Local\Temp\40f57275721bd74cc59c0c59c9f98c8e0d1742b7ae86a46e83e985cc4039c3a5.exe"C:\Users\Admin\AppData\Local\Temp\40f57275721bd74cc59c0c59c9f98c8e0d1742b7ae86a46e83e985cc4039c3a5.exe"1⤵PID:3976
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4792