General

  • Target

    1svhosf.exe

  • Size

    59KB

  • Sample

    231215-jx1v7acgf7

  • MD5

    5b672f45d525b56eb0c4c146214f267e

  • SHA1

    eef03b43ce9d36e1e513ab1c3c0f9205b41a9148

  • SHA256

    82881ebbc7c5599d1e98006d7e97106a87983b78eeca0a7cdcdddfff981e0a87

  • SHA512

    4a75ac2a4744678aa79473e9a52620ded79aa69ab6afa102d4659f447b80f8017224df52a6ceac3abd2d35fed255dc16ec0706466e523dcf4365facdddc57177

  • SSDEEP

    1536:tNeRBl5PT/rx1mzwRMSTdLpJc54NnB7K/D826:tQRrmzwR5JdnB7oD8z

Malware Config

Extracted

Path

C:\info.hta

Ransom Note
<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01//EN' 'http://www.w3.org/TR/html4/strict.dtd'> <html> <head> <meta charset='windows-1251'> <title>encrypted</title> <HTA:APPLICATION ICON='msiexec.exe' SINGLEINSTANCE='yes' SysMenu="no"> <script language='JScript'> window.moveTo(50, 50); window.resizeTo(screen.width - 100, screen.height - 100); </script> <style type='text/css'> body { font: 15px Tahoma, sans-serif; margin: 10px; line-height: 25px; background: #EDEDED; } img { display:inline-block; } .bold { font-weight: bold; } .mark { background: #D0D0E8; padding: 2px 5px; } .header { text-align: center; font-size: 30px; line-height: 50px; font-weight: bold; margin-bottom:20px; } .info { background: #D0D0E8; border-left: 10px solid #00008B; } .alert { background: #FFE4E4; border-left: 10px solid #FF0000; } .private { border: 1px dashed #000; background: #FFFFEF; } .note { height: auto; padding-bottom: 1px; margin: 15px 0; } .note .title { font-weight: bold; text-indent: 10px; height: 30px; line-height: 30px; padding-top: 10px; } .note .mark { background: #A2A2B5; } .note ul { margin-top: 0; } .note pre { margin-left: 15px; line-height: 13px; font-size: 13px; } .footer { position:fixed; bottom:0; right:0; text-align: right; } </style> </head> <body> <div class='header'> <img src='data:image/png;base64,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'> <div>All your files have been encrypted!</div> </div> <div class='bold'> At the moment there is no way to decrypt the data, except to request from us a decryptor and a key with which you will recover all your data.</div> <div class='bold'>If you want to restore them, write to us by email: <span class='mark'>[email protected]</span></div> <div class='bold'>Write this ID in the title of your message <span class='mark'>9D1AFBF8-3489</span></div> <div class='bold'>For quick and convenient feedback, write to the online operator in the Telegram messenger: <span class='mark'><a href='https://t.me/exezaz'>@exezaz</a></span> <div class='bold'>(Be careful when entering the Telegram account name, it must be exactly the same as above, beware of fake accounts.)</div> <div class='bold'>Also, from some mail services, your letter may not reach or get into spam, so to increase the likelihood of receiving a quick response, also duplicate your letters to our spare email addresses: [email protected] and [email protected]</div> <div class='bold'>Payment for decryption is made in bitcoins. In order to find out the price, write to the above contacts. The sooner you contact us, the lower the price will be. After payment, we will send you a tool that will decrypt all your files.</div> <div class='note info'> <div class='title'>Free decryption as guarantee</div> <ul>Before paying you can send us up to 3 files for free decryption. The total size of files must be less than 4Mb (non archived), and files should not contain valuable information. (databases,backups, large excel sheets, etc.) </ul> </div> <div class='note info'> <div class='title'>How to obtain Bitcoins</div> <ul> You can buy Bitcoin in any place convenient for you, a beginner's guide is here: <br><a href='http://www.coindesk.com/information/how-can-i-buy-bitcoins/'>http://www.coindesk.com/information/how-can-i-buy-bitcoins/</a> </ul> </div> <div class='note alert'> <div class='title'>Attention!</div> <ul> <li>To get guaranteed help in decrypting your files, please contact only the contacts listed in this note, because at the moment there are many scammers who,<br> under the pretext that they can decrypt your data, request a free decryption through us and pass it off as a demonstration that they can decrypt your files.</li> <li>Remember that the key for decrypting files is individual in each individual case, so you will not be able to decrypt your files yourself using third-party software, it will only spoil your files.</li> <li>If you want to communicate through an intermediary, then check the price with our operator in advance, since intermediaries often wind up the real price. !!! When contacting third parties, <br>we do not guarantee the decryption of your files!!!</li> <li>Also, to avoid problems with decryption, do not rename your files.</li> </ul> </div> </body> </html>
Emails

class='mark'>[email protected]</span></div>

[email protected]

[email protected]</div>

URLs

http://www.w3.org/TR/html4/strict.dtd'>

Targets

    • Target

      1svhosf.exe

    • Size

      59KB

    • MD5

      5b672f45d525b56eb0c4c146214f267e

    • SHA1

      eef03b43ce9d36e1e513ab1c3c0f9205b41a9148

    • SHA256

      82881ebbc7c5599d1e98006d7e97106a87983b78eeca0a7cdcdddfff981e0a87

    • SHA512

      4a75ac2a4744678aa79473e9a52620ded79aa69ab6afa102d4659f447b80f8017224df52a6ceac3abd2d35fed255dc16ec0706466e523dcf4365facdddc57177

    • SSDEEP

      1536:tNeRBl5PT/rx1mzwRMSTdLpJc54NnB7K/D826:tQRrmzwR5JdnB7oD8z

    • Phobos

      Phobos ransomware appeared at the beginning of 2019.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies boot configuration data using bcdedit

    • Renames multiple (315) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Deletes backup catalog

      Uses wbadmin.exe to inhibit system recovery.

    • Modifies Windows Firewall

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks