General

  • Target

    a1bcb4ceb586cd9dc78323ce2888080ea88a58708a3a95e546bff46d74fc13c8.bin.sample.gz

  • Size

    120KB

  • Sample

    231006-v5r4ssgg74

  • MD5

    f7df8cc077ecf7fbe22cb1df4119d82b

  • SHA1

    a465cfedfd9b3774b6368f05311381a72e2eb52d

  • SHA256

    038948014b1f44e75647fbd057c38ab560b5d72a44888802d4f1a9a6e1af8ecd

  • SHA512

    14b636f7b5c74483381008739dc0df8cdf8beaad6bae23570e9ebfc6e74f10c44c3c114a0ab819b201444faf66d005bc056cd83b3c716258ac7020390465f2b2

  • SSDEEP

    3072:r0VfS6G7UtaQ0ELVsskMdtd2VnTN2sbbwqCFN:Isstj0IdPdtd2Vx2sbdMN

Malware Config

Extracted

Path

F:\LAMBDA_README.txt

Ransom Note
[[=== Lambda Ransomware ===]] [+] What's happened? All your files are encrypted and stolen, but you need to follow our instructions. otherwise, you cant return your data (NEVER). [+] What guarantees? Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, we decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. time is much more valuable than money. [+] Instructions: a) Download and install Tor Browser from this site: https://www.torproject.org/ b) Open our website: http://nn5ua7gc7jkllpoztymtfcu64yjm7znlsriq3a6v5kw7l6jvirnczyyd.onion c) Enter this UID in the input: 445ADCC3B44559D3 !!! DANGER !!! DON'T try to change files by yourself, DON'T use any third party software for restoring your data or antivirus/edr solutions - its may entail damage of the private key and, as result, The Loss all data. SPEAK for yourself. Since no one else has the private key, any interfere of third party companies/individuals is tantamount to scamming you. ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://nn5ua7gc7jkllpoztymtfcu64yjm7znlsriq3a6v5kw7l6jvirnczyyd.onion

Targets

    • Target

      sample

    • Size

      241KB

    • MD5

      6c292c92e703a155612fe50ea96161d1

    • SHA1

      e6ea7c6f564a2fbe15beaf3419dc334d536f250c

    • SHA256

      a1bcb4ceb586cd9dc78323ce2888080ea88a58708a3a95e546bff46d74fc13c8

    • SHA512

      ab1fb843188f0a5495fea9ccd66bfc13385b95d4ffd7bfc9486e6d29f1c7f3a9468f6b7dadad29f94204d9c9055e5111e7e8c23344c322b979ebd5809096566a

    • SSDEEP

      6144:7vB3myi10AU3fb9wZ+4hCLSiqdJft5sJ:7vNq10AU3fb9wosC/J

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Modifies WinLogon

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Winlogon Helper DLL

1
T1547.004

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Winlogon Helper DLL

1
T1547.004

Defense Evasion

Modify Registry

2
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Network Service Discovery

1
T1046

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Impact

Defacement

1
T1491

Tasks