Resubmissions

01-03-2024 13:18

240301-qj37qagc71 7

28-12-2023 16:27

231228-tygh2sheh8 10

General

  • Target

    88880508fdcc246011c53f8a652d295e9cb95202bb92c7a02e463c405862e86a

  • Size

    1.7MB

  • Sample

    231228-tygh2sheh8

  • MD5

    5f1977ff2e710323036df5bf5fd7df2b

  • SHA1

    cf856ca9dfee5a3935d5e7ad192044438ab6c500

  • SHA256

    88880508fdcc246011c53f8a652d295e9cb95202bb92c7a02e463c405862e86a

  • SHA512

    8cc6808e0285a73ca90f4247982e1ee635f492a54929bad49c55ebe45f3ba45eba80777043085b811e91ceb72fab744af6e9bc93185b7450a44323886efa743a

  • SSDEEP

    49152:2svcOp7uaMh54agPw0Ic02gRotHcBWJz9FNFU:2s0KCHDdg40I9LsFQ

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Adobe\Acrobat\DC\Cache\FILE RECOVERY_ID_180870197840.txt

Ransom Note
Hello Your file has been encrypted and cannot be used When you see this letter, your privacy data has been backed up by us. If you do not handle it, we will publish your privacy data after the 7th. Don't try to change or restore the file yourself, which will destroy them If necessary, you can decrypt a test file for free. Free test decryption is only available for files less than 3MB in size. To restore files, you need a decryption tool. Please contact us by email. Please add the file name of this document to the email and send it to me. ��FILE RECOVERY_ID xxxxxx�� I will tell you the amount you need to pay. After the payment is completed, we will make the decryption tool and send it to you. Customer service mailbox: locked@onionmail.org Spare mailbox: (use this mailbox after no reply in 24 hours) liveteam@onionmail.org You can also contact us through intermediary agencies (such as data recovery companies) If you refuse to pay, you will be attacked constantly. Your privacy -sensitive data will also be announced on Internet. !! We are a team that pays attention to credibility, so you can pay safely and restore data. LIVE TEAM
Emails

locked@onionmail.org

liveteam@onionmail.org

Targets

    • Target

      88880508fdcc246011c53f8a652d295e9cb95202bb92c7a02e463c405862e86a

    • Size

      1.7MB

    • MD5

      5f1977ff2e710323036df5bf5fd7df2b

    • SHA1

      cf856ca9dfee5a3935d5e7ad192044438ab6c500

    • SHA256

      88880508fdcc246011c53f8a652d295e9cb95202bb92c7a02e463c405862e86a

    • SHA512

      8cc6808e0285a73ca90f4247982e1ee635f492a54929bad49c55ebe45f3ba45eba80777043085b811e91ceb72fab744af6e9bc93185b7450a44323886efa743a

    • SSDEEP

      49152:2svcOp7uaMh54agPw0Ic02gRotHcBWJz9FNFU:2s0KCHDdg40I9LsFQ

    • Clears Windows event logs

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies boot configuration data using bcdedit

    • Renames multiple (837) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Deletes system backups

      Uses wbadmin.exe to inhibit system recovery.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

Defense Evasion

Indicator Removal

4
T1070

File Deletion

3
T1070.004

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Impact

Inhibit System Recovery

4
T1490

Tasks