General

  • Target

    db8b499d613b604a439bca37c3be2f578bdfcde1b2271eccbcf22db85996e785.exe

  • Size

    228KB

  • Sample

    231029-xrnkkaha2y

  • MD5

    e134d5a91ed31516566a091c0caa76fe

  • SHA1

    260c54f8ef9450d2366794f35d0b291bdc133ec5

  • SHA256

    db8b499d613b604a439bca37c3be2f578bdfcde1b2271eccbcf22db85996e785

  • SHA512

    4bccd544d3f53e4240b62651465eee6347cf54501437cf7d6f79060707ba702f4ff16435aeb342099f4b238e7b7372a60a2271b3a9b537e4893d743874c8d1db

  • SSDEEP

    3072:PaOtRGsL8/MmCtAyBsli4bnQC2mCr/yXt5NKMxyNuX987URxf+zgTP7VZKf:PhGsL8kfAyBslvAyd3KMxomvf+iC

Malware Config

Extracted

Path

C:\Users\Admin\Downloads\How_To_Decrypt_My_Files.txt

Family

ragnarok

Ransom Note
#what happend? Unfortunately your files are encrypted, To decrypt your files follow the instructions 1. you need a decrypt tool so that you can decrypt all of your files 2. contact with us for our btc address if you want decrypt your files or you can do nothing just wait your files gona be deleted 3. you can provide a file which size less than 3M for us to prove that we can decrypt your files after you paid 4. it is wise to pay in the first time it wont cause you more losses DEVICE ID: ---------------------------- ==AAswyQBZ0RWl0RPxSNFZ0N1EzQ0MUMzczQBRUM3QDOxQjN5IUMxYzNEhjR5QzNwMzM3kDO5kjMElzQ2YDOBJUOCFDO3M0N0QEO4ITMDhTN4cjR0Y0QFFjNCR0QDJzQDFUNzYTOyMjRygTMBVTM4cjM3AjNyI0N5ITRwUEN4gDMDV0QwETR3MERBRjRCVDRzEDRCNER5QjM3YkQFRERykzN2UkRGR0NzIERGJkRFFUM0YTRDNjRDFkNycTM5UDO5UzNyEDNwEENEdjN1YkQERjRyEjQyUUNFJTQyIjQwkjQDJjN4gjQyQUM1IkQ1EkQEFUNFhjQGFjNERjR3UDMyMkR2IUR5AjRDVEODVzQxETRCRUMzgDN3QDREFEO5YkM3MUMzITNxYzM0YTMEBTM0QUNBJjMDBzM4IUN1UkQ0cTQBJ0M0UjMBRzQzgTMEdzN5EkM0QEN4MzMFVUNxMjQ2YER4UTQ2AzMBNkQyMERCJkR0YzQGVjM4MkREFjMyQEO3IEOykTRDRzN4MUMBJTOxUjRBJjQCJTQGVkN3MDNENTN4UDMyYENxIEMBNEOFVTQ1kDRxUUQCVkM1MzNBNjN3MkQ0QjQ5Q0M5IjM5YERBJUNERUN3MzNDZzN1ETO2YDOCJUOyY0QDZTNxMkMCNTOzEjMDJEMzEUO5UjNxATNGJ0QDZERBNTO0IURBNkMzUDR5ADOBFjNGVTQFZEOycDN3QjR4EEODlDNDRkQEZ0MERUR0IkMzUjN3IDN3MENCF0M5QEN0MDO3QTRBRjMFhTO4IkMGlDOGdDR4MkNxcDM0ETOGFTR5kTNGZkR5ATNEREOzIzQEJENBVkMzMTR0YzQxkjNEdTQ5UERyQTNDlDN4kTMDNDODFTO5Q0MGNTM5QUQxYUOxMUQ4kTQ1ETQERzNGRDOzgjNDFUMGlDM4gzM2UkQDFzNEFDOGNzMBNUNFRjQ2QDNxI0M1kjR4IzNEJjQ1QDOxkDMEFUQ0EUQCNTRyITQ2YTMGRkNzMTO3kTOENDRyI0NxgzM4gzNwIERycjRDdDNBFzNzIjRxQENDdDRCBTQBdDRCRzQCJUMxMTNzY0M0czQEZUM5QDNDNkQwI0QDFENzUDMzcTRGF0MEJDOBVEN4IjNxYURCREN0YTRCV0NDZTN4MER4MUOGZDOyUjM5IjQ2EURyE0QzUENBljMGJDOxgjNzIjR4cTR4IDNGNkQCF0M4YjNGNkQ3UEOBNkR4cjM5YjNyM0QzATRBNjN5gTMFFTN4Q0MClzM1YEO5UzNEdTNEhTM0AjQEN0N0UEOxIEMxMTQygTQClzN3cDM2Y0M3YEOFV0MCVTNycjM ---------------------------- you can send your DEVICE ID to mail address below [email protected]

Targets

    • Target

      db8b499d613b604a439bca37c3be2f578bdfcde1b2271eccbcf22db85996e785.exe

    • Size

      228KB

    • MD5

      e134d5a91ed31516566a091c0caa76fe

    • SHA1

      260c54f8ef9450d2366794f35d0b291bdc133ec5

    • SHA256

      db8b499d613b604a439bca37c3be2f578bdfcde1b2271eccbcf22db85996e785

    • SHA512

      4bccd544d3f53e4240b62651465eee6347cf54501437cf7d6f79060707ba702f4ff16435aeb342099f4b238e7b7372a60a2271b3a9b537e4893d743874c8d1db

    • SSDEEP

      3072:PaOtRGsL8/MmCtAyBsli4bnQC2mCr/yXt5NKMxyNuX987URxf+zgTP7VZKf:PhGsL8kfAyBslvAyd3KMxomvf+iC

    • Ragnarok

      Ransomware family deployed from Citrix servers infected via CVE-2019-19781.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies boot configuration data using bcdedit

    • Renames multiple (428) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Modifies Windows Firewall

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks