General

  • Target

    f7f85240efa2ebe980a83df6c3d834699703ba1c3c5f38ec58687aba219a0c03

  • Size

    2.4MB

  • Sample

    240101-pmgbpaagej

  • MD5

    18ad51c411e955400dfda2e1ec290d25

  • SHA1

    f5a896e93f0c068441bbf2d76fd44571a61869b8

  • SHA256

    f7f85240efa2ebe980a83df6c3d834699703ba1c3c5f38ec58687aba219a0c03

  • SHA512

    6a5315f66dec6f8a790c2aa39f656170fcd4c6507f0364cc949c97af41439b4fb1d6f4f131e513b00c06ac6a17906b9cbced8db1c57fe800ed0955b10d928a9f

  • SSDEEP

    49152:j5t2anwKeCP+0NevGW/9WVttBfZir9TXpbyGu9LgBg6cuquAbyJKfHYAMHz5kURY:72anw5CP+eeR1MtPZiZTXp+Gu9Lr6cu8

Score
10/10

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\HOW TO RESTORE YOUR FILES.TXT

Ransom Note
Dear Management of Dellner Couplers AB! We inform you that your network has undergone a penetration test, during which we encrypted your files and downloaded more than 240 GB of your and your customers data, including: Confidentional documents Copy of some mailboxes Accounting Databases backups Marketing data We understand that if this information gets to your clients or to media directly, it will cause reputational and financial damage to your business, which we wouldn't want, therefore, for our part, we guarantee that information about what happened will not get into the media (but we cannot guarantee this if you decide to turn to third-party companies for help or ignore this message). Important! Do not try to decrypt the files yourself or using third-party utilities. The only program that can decrypt them is our decryptor, which you can request from the contacts below. Any other program will only damage files in such a way that it will be impossible to restore them. You can get all the necessary evidence, discuss with us possible solutions to this problem and request a decryptor by using the contacts below. Please be advised that if we don't receive a response from you within 3 days, we reserve the right to publish files to the public. Contact me: [email protected] or [email protected] Additional ways to communicate in tox chat https://tox.chat/ contact our tox id: 5BF6FF6E9633FDCF1441BF271CBE5DAE1B6B027FA5B85A6EE5704E8B7FEC8E50A323CD66F7D2
URLs

https://tox.chat/

Targets

    • Target

      f7f85240efa2ebe980a83df6c3d834699703ba1c3c5f38ec58687aba219a0c03

    • Size

      2.4MB

    • MD5

      18ad51c411e955400dfda2e1ec290d25

    • SHA1

      f5a896e93f0c068441bbf2d76fd44571a61869b8

    • SHA256

      f7f85240efa2ebe980a83df6c3d834699703ba1c3c5f38ec58687aba219a0c03

    • SHA512

      6a5315f66dec6f8a790c2aa39f656170fcd4c6507f0364cc949c97af41439b4fb1d6f4f131e513b00c06ac6a17906b9cbced8db1c57fe800ed0955b10d928a9f

    • SSDEEP

      49152:j5t2anwKeCP+0NevGW/9WVttBfZir9TXpbyGu9LgBg6cuquAbyJKfHYAMHz5kURY:72anw5CP+eeR1MtPZiZTXp+Gu9Lr6cu8

    Score
    10/10
    • Detecting the common Go functions and variables names used by Snatch ransomware

    • Snatch Ransomware

      Ransomware family generally distributed through RDP bruteforce attacks.

    • Renames multiple (77) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      out.upx

    • Size

      4.3MB

    • MD5

      d2dbbdbbd8882cca722d0d1cc76b9701

    • SHA1

      977d8ef32c7b9992617e2f5b5943ea9bda089c6f

    • SHA256

      4fe0c409ecf96c5662fa385ed01dd84ceeceabc3781f11e70855db5328e2033a

    • SHA512

      c39d09e6d873921ab99174dfdf6b1a3d83db2d70a2a5757d4fca2815f4329c16b4e9989a5e3b767d0048b6a222e3bfdce236c5234ec1f7723424ec2c94cc424c

    • SSDEEP

      98304:1WktIWOfqMdgFpXEbQ9tdzeI1svziyZOM4:1WktI/fqMdgFlX0vz2M4

    Score
    1/10

MITRE ATT&CK Matrix

Tasks