General

  • Target

    03097f75904007de33f69ec77e02146fe2a0b3d3b2a923640677bb1f46815b07.bin.sample.gz

  • Size

    78KB

  • Sample

    231022-tacvyscd33

  • MD5

    af6f9b7b0ff42c356a9a0734e56c52a4

  • SHA1

    092441089839b5d81c7974fc9dc397a8e51b206a

  • SHA256

    24f1c2a20833b1d6f88cb5e73513cc0f163e7c552db78fb783523fb3e1c3a75d

  • SHA512

    e5a413b4e865b88c34c9f0992d277af851afb8fa5ca84d367563eab43111e49dfc7bfd88e1924d5b56c337cdc258e6b79cf67861a39eef76b966750c1b030779

  • SSDEEP

    1536:DiMiHX/8x5BsU7YyWo6A4v/2LPJTVZMnI1aqzmqVaRWqqdCaGBuVq7+9SMlJT:DiMsX0DB/YyPuuLPJTVZMI1aqzmJo4oP

Malware Config

Extracted

Path

C:\ProgramData\Merlin_Recover.txt

Ransom Note
Your ID is: 5F03B352D4822F03 Q: How to contact us? A: Install session messenger from this link : https://getsession.org/download And chat with us. This is our sessions ID: 05752759728f65ca92b3d98fc72500cdb7c5b11eb7b17f7d8afc6b8ecdcbdedf6d OR Contact with these email addresses: Merlin@outlookpro.net Merlin@cyberfear.com Merlin@onionmail.org ** Make sure to include the ID in the first line of massages or subject of email, otherwise we won�t answer your massages. Q: What's Happened? A: Your files have been encrypted and now have the "Merlin" extension. The file structure has been changed to unreadable format, so they are inaccessible. Your critical information has been downloaded, including databases, financial/developmental, accounting, and strategic documents. Q: How to recover files? A: If you want to decrypt all of your data and return your systems to operative state, you require a decryption tool. We are the only ones who own it, and also, if you want your stolen data will be wiped out from our systems, you better contact us. Q: What about guarantees? A: we decrypt 2 non_important files under 5MB for free (they should not include sensitive information). We will decrypt them and send them back to you. They can be from different computers on your network to be sure that one key can decrypts your whole systems. That is our guarantee. It's just a business and we don't pursue any political objectives. We absolutely do not care about you and your data except the money and our reputation are the only things that matters to us. if we do not do our work and liabilities, nobody will cooperate with us which is not in our interests. Q: How will the decryption process proceed after payment? A: After payment, we will send you our decryption program + detailed instructions for use. With this program, you will be able to decrypt all your encrypted files. *** Important *** 1- certain files that were encrypted but not renamed to "Merlin" extension, they will also be recovered by the decryption tool. 2- If you want the decryption procedure to be effective, DO NOT delete or modify the encrypted files, it will cause issues with the decryption process. 3- Beware Any organization or individual who asserts they can decrypt your data without paying us should be avoided. They just deceive you and charge you much more money as a consequence; they all contact us and buy the decryption tool from us. Q: If you don't want to pay to us? A: it does not matter to us, but you have to accept its consequences: 1- Your data will be leaked for free on TOR darknet and your competitors can have access to your data. 2- We know exactly what vulnerabilities exist in your network and will inform google about them. The money we asked for is nothing compare to all of these damages to your business so we recommend you to pay the price and secure your business. If you pay we will give you tips for your security so it can�t be hacked in the future besides you will lose your time and data cause we are the only ones that have the private key. In practice - time is much more valuable t
Emails

Merlin@outlookpro.net

Merlin@cyberfear.com

Merlin@onionmail.org

URLs

https://getsession.org/download

Targets

    • Target

      sample

    • Size

      146KB

    • MD5

      1784d03173fd273f9810be0a48f1f383

    • SHA1

      b4354665152723b9fa6e31f07d155265a1d6e2f6

    • SHA256

      03097f75904007de33f69ec77e02146fe2a0b3d3b2a923640677bb1f46815b07

    • SHA512

      35dad75e13ab4363ee1495e304e58ec11f731da1f8e21ce9690cfd0cff7d77c50f8b9b5584208e315c8cbb71345401e6ffd771427690b2cffcb40b3ec78b7edb

    • SSDEEP

      3072:nyPZHpVIYbQf91G3im/2Ef07Jysgk8vRFHoCj1advu07rr/b/V53SgvB+qMDDpvy:n2HpV+8vnvEu0Xrjt5igvy6Qijx3P

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (10319) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Renames multiple (7055) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Defense Evasion

Indicator Removal

2
T1070

File Deletion

2
T1070.004

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Impact

Inhibit System Recovery

2
T1490

Tasks