General

  • Target

    b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe

  • Size

    169KB

  • Sample

    231029-xsr95sag33

  • MD5

    98562209465bec53327e65649a2b8829

  • SHA1

    3a47656ed3df213bd934aa01078a863568fe9f2b

  • SHA256

    b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe

  • SHA512

    c11ce14f9cb75df2bc9bd81971c1f8fa885815715f389eb8e796e0f657de59756b36a6f896c216a03c7be7bb3ddff9b8a47aee71146760e4f4d9c6bdc0ff2cc3

  • SSDEEP

    3072:iFgiMd04bHHr/QFDtaruNyXgs7WL61fXbEiVkYELY2P+gA/PF:UE3bHL/ngsu61kYELNmhF

Malware Config

Extracted

Path

C:\Users\Admin\Music\!!Read_Me.CBF5C.html

Ransom Note
<!DOCTYPE html><h1>#ALL YOUR FILES ARE ENCRYPTED AND STOLEN BY RAGNAROK</h1>Dear Sir<br><br>Your files are encrypted with RSA4096 and AES encryption algorithm. <br>But don't worry, you can return all your files!! follow the instructions to recover your files <br><br>Cooperate with us and get the decrypter program as soon as possible will be your best solution.<br>Only our software can decrypt all your encrypted files.<br><br>What guarantees you have?<br>We take our reputation seriously. We reject any form of deception</br>You can send one of your encrypted file from your PC and we decrypt it for free. <br>But we can decrypt only 1 file for free. File must not contain any valuable information.<br>When hiring third-party negotiators or recovery companies. listen to what they tell you. try to think.<br> Are they really interested in solving your problems or are they just thinking about their profit and ambitions?<br><br>By the way.We have stolen lots of your company and your private data which includes doc,xls,pdf,jpg,mdf,sql,pst...<br>Here we upload sample files of your company and your private data on our blog :<br>http://wobpitin77vdsdiswr43duntv6eqw4rvphedutpaxycjdie6gg3binad.onion<br>We promise that if you don't pay within a week, we will package and publish all of your company and your data on our website.<br>We also promise we can decrypt all of your data and delete all your files on internet after your payment.<br>Such leaks of information lead to losses for the company. fines and lawsuits. And don't forget that information can fall into the hands of competitors!<br>For us this is just business and to prove to you our seriousness.<br><br>Our e-mail:<br> [email protected]<br><br> Reserve e-mail:<br>[email protected]<br>[email protected]<br><br>Device ID:<br> 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
Emails

[email protected]<br><br>

e-mail:<br>[email protected]<br>[email protected]<br><br>Device

Targets

    • Target

      b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe

    • Size

      169KB

    • MD5

      98562209465bec53327e65649a2b8829

    • SHA1

      3a47656ed3df213bd934aa01078a863568fe9f2b

    • SHA256

      b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe

    • SHA512

      c11ce14f9cb75df2bc9bd81971c1f8fa885815715f389eb8e796e0f657de59756b36a6f896c216a03c7be7bb3ddff9b8a47aee71146760e4f4d9c6bdc0ff2cc3

    • SSDEEP

      3072:iFgiMd04bHHr/QFDtaruNyXgs7WL61fXbEiVkYELY2P+gA/PF:UE3bHL/ngsu61kYELNmhF

    • Locky

      Ransomware strain released in 2016, with advanced features like anti-analysis.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies boot configuration data using bcdedit

    • Renames multiple (164) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Modifies Windows Firewall

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Defense Evasion

Indicator Removal

2
T1070

File Deletion

2
T1070.004

Discovery

Remote System Discovery

1
T1018

Impact

Inhibit System Recovery

3
T1490

Tasks