General

  • Target

    samples5.zip

  • Size

    322KB

  • Sample

    240101-svv2ladbdn

  • MD5

    ecd0abc33637ca50ea4c8aff149d0242

  • SHA1

    66d943b612513b34d06b0555b9e7136cf97e0d0a

  • SHA256

    5023ffe58f1945012086d05f637983928e3e7c16eb5487196096d43b39d151ef

  • SHA512

    7f6a3a919c023c77de66fade82a6ca2e8838c0fca29d804288281e8daa995e7faad81b42ac2efaae6356d65bd09d16abd12ae2143ce49df60ce46cc52518491e

  • SSDEEP

    6144:45dGX0EnlLStEnG5cETVfMewGtZW3ziNjdK6PfFBKWsWlwOBoWTq:45wEEnN2Y7EhMNGtZW3zihd1M7Wip

Malware Config

Extracted

Ransom Note
All your files have been encrypted! All your files have been encrypted due to a security problem with your PC. If you want to restore them, write us to the e-mail [email protected] Write this ID in the title of your message D08133EB In case of no answer in 24 hours write us to theese e-mails: [email protected] You have to pay for decryption in Bitcoins. The price depends on how fast you write to us. After payment we will send you the decryption tool that will decrypt all your files. Free decryption as guarantee Before paying you can send us up to 5 files for free decryption. The total size of files must be less than 10Mb (non archived), and files should not contain valuable information. (databases,backups, large excel sheets, etc.) How to obtain Bitcoins The easiest way to buy bitcoins is LocalBitcoins site. You have to register, click 'Buy bitcoins', and select the seller by payment method and price. https://localbitcoins.com/buy_bitcoins Also you can find other places to buy Bitcoins and beginners guide here: http://www.coindesk.com/information/how-can-i-buy-bitcoins/ Attention! Do not rename encrypted files. Do not try to decrypt your data using third party software, it may cause permanent data loss. Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.

Extracted

Path

C:\Program Files (x86)\Adobe\Reader 9.0\Esl\decrypt_Last_Chance.html

Ransom Note
<!DOCTYPE html> <html> <title>TargetWare Decryption Information</title> <meta name="viewport" content="width=device-width, initial-scale=1"> <head> <link rel="stylesheet" href="https://fonts.googleapis.com/icon?family=Material+Icons"> </head> <link rel="stylesheet" href="https://www.w3schools.com/w3css/4/w3.css"> <STYLE type="text/css"> BODY { background-color: rgb(246, 246, 246); } </STYLE> <body> <div class="w3-container w3-center " > <img src="https://www.seekpng.com/png/detail/227-2279324_oops-oops-png.png"> <div class="w3-container w3-border w3-small w3-content"> <div class="w3-panel w3-border-top w3-border-bottom w3-border-black w3-pale-gray " > <b>Dear Curexa, it`s only a warning to you. <br><br> Also we can wipe your systems but give you chance <br><br> Contact us within 48 hours for get more details ;) We also steal your databases with Prescriptions and Patient info.<br><br> <br><br> What happened to your files?<br><br> We completed target attack on your company.<br> All your files were encrypted by a <br> strong encryption with RSA2048 .<br> Our software not decryptable for free !<br> Try search in Google : MMM Ransomware, Triple M ransomware</b> ;)<br> </div> </div> <div class="w3-container w3-border w3-small w3-content"> <div class="w3-panel w3-border-top w3-border-bottom w3-border-black w3-pale-gray w3-content"> <b>Recomendations</b><br> Do not attempt to recover the files yourself.You might corrupt your files.<br> We rewrite all old blocks on your HDD and you can`t recover files with <br> Recuva ,Acronis etc...<br> <br> . </div> </div> <div class="w3-container w3-border w3-small w3-content"> <div class="w3-panel w3-border-top w3-border-bottom w3-border-black w3-pale-gray w3-content"> <b>How decrypt files?</b><br><br> Your uniq ID it`s <b>CRX202304</b>.<br> You have only 48 hours for contact with us.<br> Write within this time to email [email protected] or if you don`t get answer within 12 hours to Jabber (use Psi+ or Pidgin clients)<b> [email protected] </b><br> In first message write your uniq ID <b>CRX202304</b><br><br> </div> </div> </div> </body> </html>

Extracted

Path

C:\Users\Admin\Pictures\0_HELP_DECRYPT_FILES.html

Ransom Note
<html> <title> Decrypt Files </title> <center> <body> <div> <h1>Attention!</h1> <h2>All of your files have been encrypted!</h2> <p>----Not your language? USE: <a href=http://translate.google.com>Click Here</a>---- <br /> ------------------------------------------------------------------------------------------------- <br /> <h3>All of your files (photos, videos, documents, etc) are encrypted using AES-256 bit encryption</h3> <br />https://en.wikipedia.org/wiki/Advanced_Encryption_Standard <br /> <br /> Decrypting of your files is only possible with the private key and a decrypt program <br /> which is on our secret server. <br /> Decryption of your files will cost you $300 Dollars worth of Bitcoin <br /> <h4><font color=FF0000>Your files will be lost at 1/8/2024 3:31:48 PM, when this date has been passed your files are lost forever.</font></h4> <br /> <h3>Please follow these instructions:</h3> <br /> <h3>1. You can make a payment with Bitcoin, there are many methods to get them.</h3> <br /> <h3>2. Register a bitcoin wallet or login to one if you already have one, if you don't we recommend http://blockchain.info</h3> <br /> <h3>3. Purchasing Bitcoins, altought it's not yet easy to buy bitcoins, it's getting simpler every day</h3> <br /> Here are our recommendations: <br /> <a href=https://localbitcoins.com/>localbitcoins.com/</a> International <br /> <a href=http://blockchain.info>blockchain.info</a> <br /> <a href=http://coincafe.com>coincafe.com</a> <br /><a href=https://buy.bitcoin.com/>buy.bitcoin.com/</a> <h4>Need Help Buying Bitcoins?</h4> How to buy bitcoin: <a href=https://bitcoin.org/en/buy>Click Here</a> <h3>4. Send 0.1 Bitcoins to the address specified below. On the note when sending payment,include your personal Identifier and your email where <br /> you would like to receive your decryption program and key, if that is not possible send email to [email protected] with your Personal Identifier, your bitcoin transaction ID and your email address.</h3> <br /> -------------------------------------------------------------------------------------- <br /> YOUR PERSONAL IDENTIFIER: 8E368ACAD5FCB618301D37645FB10DA7 <br /> Bitcoin Address: (Send Bitcoins here): 15mA1ea42KSRpjYDiEJYjrHCjjMp3Cq3SG <br /> Bitcoin Amount: $300 Dollars worth of Bitcoins <br /> -------------------------------------------------------------------------------------- <br /> <h3>5. After your payment has been confirmed, you will receive your decryption program and key in 1 hour<br /> to your email address you specified on step 4.<br /> </h3> . <br /> </div> </body> </center> </html> <style> html { background-color: white; font-family: Helvetica, sans-serif; } div { background-color: lightgrey; width: 80: %; border: 2px solid black; padding: 25px; margin: 25px; } </style>
Wallets

15mA1ea42KSRpjYDiEJYjrHCjjMp3Cq3SG

URLs

http://blockchain.info</h3>

Extracted

Path

C:\Users\Admin\Documents\0_HELP_DECRYPT_FILES.txt

Ransom Note
Attention! All of your files have been encrypted ----Not your language? USE: https://translate.google.com/---- ------------------------------------------------------------------------------------------------- All of your files (photos, videos, documents, etc) are encrypted using AES-256 bit encryption https://en.wikipedia.org/wiki/Advanced_Encryption_Standard Decrypting of your files is only possible with the private key and a decrypt program which is on our secret server. Decryption of your files will cost you $300 Dollars worth of Bitcoin Your files will be lost at 1/8/2024 3:31:48 PM, when this date has been passed your files are lost forever. Please follow these instructions: 1. You can make a payment with Bitcoin, there are many methods to get them. 2. Register a bitcoin wallet or login to one if you already have one, if you don't we recommend http://blockchain.info 3. Purchasing Bitcoins, altought it's not yet easy to buy bitcoins, it's getting simpler every day Here are our recommendations: https://localbitcoins.com/ International https://blockchain.info https://coincafe.com https://buy.bitcoin.com/ 4. Send 300$ dollars worth of Bitcoins to the address specified below. On the note when sending payment,include your personal Identifier and your email where you would like to receive your decryption program and keyif that is not possible send email to [email protected] with your Personal Identifier, your bitcoin transaction ID and your email address. -------------------------------------------------------------------------------------- YOUR PERSONAL Identifier: 8E368ACAD5FCB618301D37645FB10DA7 Bitcoin Address: 15mA1ea42KSRpjYDiEJYjrHCjjMp3Cq3SG Bitcoin Amount: 300$ dollars worth of Bitcoins -------------------------------------------------------------------------------------- 5. After your payment has been confirmed, you will receive your decryption program and key in 1 hour to your email address you specified on step 4. .
Wallets

15mA1ea42KSRpjYDiEJYjrHCjjMp3Cq3SG

URLs

http://blockchain.info

https://buy.bitcoin.com/

Extracted

Path

C:\Program Files (x86)\Adobe\Reader 9.0\Esl\RESTORE_triple_m__FILES.html

Ransom Note
<html> <head>, <meta http-equiv="Content-Type" content="text/html; charset=utf-8"> <title>TripleM Ransomware</title> </head> <body bgcolor="#F5F5F5"> <pre> $$$$$$$$\ $$\ $$\ $$\ $$\ $$$\ $$\ $$\ $$\ $$\ $$\ $$\ $$$\ $$$$$$$\ $$\ \__$$ __| \__| $$ | $$$\ $$$ | $$ _|$$$\ $$$ |$$$\ $$$ |$$$\ $$$ | \$$\ $$ __$$\ $$$$ | $$ | $$$$$$\ $$\ $$$$$$\ $$ | $$$$$$\ $$$$\ $$$$ | $$ / $$$$\ $$$$ |$$$$\ $$$$ |$$$$\ $$$$ | \$$\ $$ | $$ | $$$$$$\ $$$$$$$\ $$$$$$$\ $$$$$$\ $$$$$$\$$$$\ $$\ $$\ $$\ $$$$$$\ $$$$$$\ $$$$$$\ $$\ $$\ \_$$ | $$ |$$ __$$\ $$ |$$ __$$\ $$ |$$ __$$\ $$\$$\$$ $$ | $$ | $$\$$\$$ $$ |$$\$$\$$ $$ |$$\$$\$$ $$ | $$ | $$$$$$$ | \____$$\ $$ __$$\ $$ _____|$$ __$$\ $$ _$$ _$$\ $$ | $$ | $$ | \____$$\ $$ __$$\ $$ __$$\ \$$\ $$ | $$ | $$ |$$ | \__|$$ |$$ / $$ |$$ |$$$$$$$$ |$$ \$$$ $$ | $$ | $$ \$$$ $$ |$$ \$$$ $$ |$$ \$$$ $$ | $$ | $$ __$$< $$$$$$$ |$$ | $$ |\$$$$$$\ $$ / $$ |$$ / $$ / $$ |$$ | $$ | $$ | $$$$$$$ |$$ | \__|$$$$$$$$ | \$$\$$ / $$ | $$ |$$ | $$ |$$ | $$ |$$ |$$ ____|$$ |\$ /$$ | \$$\ $$ |\$ /$$ |$$ |\$ /$$ |$$ |\$ /$$ | $$ | $$ | $$ |$$ __$$ |$$ | $$ | \____$$\ $$ | $$ |$$ | $$ | $$ |$$ | $$ | $$ |$$ __$$ |$$ | $$ ____| \$$$ / $$ | $$ |$$ | $$ |$$$$$$$ |$$ |\$$$$$$$\ $$ | \_/ $$ | \$$$\ $$ | \_/ $$ |$$ | \_/ $$ |$$ | \_/ $$ |$$$ / $$ | $$ |\$$$$$$$ |$$ | $$ |$$$$$$$ |\$$$$$$ |$$ | $$ | $$ |\$$$$$\$$$$ |\$$$$$$$ |$$ | \$$$$$$$\ \$ / $$$$$$\ \__|\__| \__|$$ ____/ \__| \_______|\__| \__| \___|\__| \__|\__| \__|\__| \__|\___/ \__| \__| \_______|\__| \__|\_______/ \______/ \__| \__| \__| \_____\____/ \_______|\__| \_______| \_/ \______| $$ | $$ | \__| </pre> <p><center><b> </br><font size="5" face="Arial">NOT YOUR LANGUAGE? Use Google Translate</br> </br><font size="5" color="lime" face="Arial">What happened to your files?</font></br> All of your files were encrypted by a strong encryption with RSA2048</br> </br><font size="5" color="lime" face="Arial">How did this happen?</font> <ul> <li>Specially for your PC was generated personal RSA2048 Key, both public and private.</li> <li>ALL YOUR FILES were encrypted with the public key, which has been transferred to your PC via the Internet.</li> <li>Decrypting of your files is only possible with the help of the private key and decrypt program, which is on our Server</li> </ul> </br></br> <font size="5" color="lime" face="Arial">What do I do?</font> </br>So,there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW and restore your data easy way. </br>If you have really valuable data, your better not waste your time, because there is no other way to get your files, except payment. </br></br>Your personal ID: <font size="5" color="orange" face="Arial">4whqvbeq.ofi</font> </br>Your personal wallet adress: <font size="5" color="orange" face="Arial"> 35iCvpMMnUWcSWrYtLJLXqe9xo5CYEWRhw</font> </br></br> </br> Your price start from 0,25 BTC , after week he is 0,5 BTC , after 3 week he is 1 BTC. After 4 week your secret key has been deleted. </br></br> <font size="5" color="lime" face="Arial">Instruction:</font> </br>1)Buy Bitcoin on btc exchange sites (Coinbase,Localbitcoins, Coinmama and another).For buy Bitcoin you need confirm your Identify. </br>2)send Bitcoins to <font size="5" color="orange" face="Arial"> 35iCvpMMnUWcSWrYtLJLXqe9xo5CYEWRhw</font> </br>3)Write us to email <font size="5" color="orange" face="Arial">[email protected]</font> </br>4)After we confirm payment - we send you decryption software and Private Key for decrypt your files. </b></font></center></p> </body> </html>
Emails

face="Arial">[email protected]</font>

URLs

http-equiv="Content-Type"

Targets

    • Target

      samples5.zip

    • Size

      322KB

    • MD5

      ecd0abc33637ca50ea4c8aff149d0242

    • SHA1

      66d943b612513b34d06b0555b9e7136cf97e0d0a

    • SHA256

      5023ffe58f1945012086d05f637983928e3e7c16eb5487196096d43b39d151ef

    • SHA512

      7f6a3a919c023c77de66fade82a6ca2e8838c0fca29d804288281e8daa995e7faad81b42ac2efaae6356d65bd09d16abd12ae2143ce49df60ce46cc52518491e

    • SSDEEP

      6144:45dGX0EnlLStEnG5cETVfMewGtZW3ziNjdK6PfFBKWsWlwOBoWTq:45wEEnN2Y7EhMNGtZW3zihd1M7Wip

    Score
    1/10
    • Target

      104b5623d8edd7e56d7e824d900ef57cc085ad7b2935c794af58de87d4f8c2d3

    • Size

      29KB

    • MD5

      fd9abbc53b247ccbbbfd22993cfa4b10

    • SHA1

      35d939c8bee3a1ddcbb7406825fb4454614f0fcb

    • SHA256

      104b5623d8edd7e56d7e824d900ef57cc085ad7b2935c794af58de87d4f8c2d3

    • SHA512

      3fb29c4276889b49b8956b03303585e2879b9363aca02bae17dc646098284219ceb2424f63e4eb4087a6f80bee9dcf74f761297845d7e1fce80a6466009ace6b

    • SSDEEP

      384:6Z567E+26NJn2WhF+EQV2FZ/bT3aoub+L/4IwPSkMozhzo80uNnokwAcJ78ywAt3:g6NJn2WhZxVPazx9npa8+zprEXa

    Score
    1/10
    • Target

      160010289cc38de42f7b75fa817a6ef7931bfd8aa1370fb09559b2e035e05702

    • Size

      28KB

    • MD5

      9231cbdb8f3330e559c46b578490c0cc

    • SHA1

      fb3db5b7b9bc77582af3e02253b68d7ae2b50b83

    • SHA256

      160010289cc38de42f7b75fa817a6ef7931bfd8aa1370fb09559b2e035e05702

    • SHA512

      67f22d8496b03a34027c56365adfdb36d4b0726221849ac85305b3ead2d3c72c43de66068880456f5d64e9c789c312e44bd03c650586afbdb57b455625864463

    • SSDEEP

      384:M/OLs5ZZDiBhgpyFRR89aCCCCCCCCCCCCCCCCCCCCCCCCXCCCCCCCCCCXXXCCXC6:M/0OZDiPOu49LjoDbY6cA

    Score
    1/10
    • Target

      1a757d4aa506d48a09ed5cf0c8f21b6d65a55f5e8aa736873a9e523c4278156f

    • Size

      25KB

    • MD5

      b49d13d507f35be47945b2eb53a5d54c

    • SHA1

      d4b4bf08f933b9c98df396055a64b329c896e6f9

    • SHA256

      1a757d4aa506d48a09ed5cf0c8f21b6d65a55f5e8aa736873a9e523c4278156f

    • SHA512

      4fd01904a11fd3a56007f47eb2664f51ecfb60dce90aee2605332c6e3733682b1b3986f8b6d3033f22716860daff26f0fecf2616168265c587b554bdcca9a6bb

    • SSDEEP

      768:eVKIbqbiu9UwDZ17CLX38t21XUkNypr3V:SqbiujDr7U3X1ELpr3V

    Score
    1/10
    • Target

      21ff399e57cc306a1ae1daab6009ea40c8aa96c39296d0f8781626de6bd19256

    • Size

      25KB

    • MD5

      fd6f36f4679ad49fc90b8bd1d72dfefb

    • SHA1

      47547f710e25de4a2d7b7e4aaf6a4248690fe59f

    • SHA256

      21ff399e57cc306a1ae1daab6009ea40c8aa96c39296d0f8781626de6bd19256

    • SHA512

      aa595796be82762034fb20109b0b768c04d14b3f27c755be53348eef533389d055552ea080e483397dc6af64fae69167fa01fa8a14555014632b2f80060a6f21

    • SSDEEP

      384:8l0heVewkBlnNynpTQ0JV6f0PDkcfV82SbGQ+jDZ0cuB+86OVbujItUqA0N9KuW:87ewkBlUhb6UXpkG5md6soItUqA0auW

    Score
    1/10
    • Target

      3c311150e20d76edd9274cec783068667637b6b5f3b6e1a5031a8605b895fabf

    • Size

      13KB

    • MD5

      9b6667a85111d6b38571dbd70dd402bb

    • SHA1

      d8a0058efc95fde81798e7c9228ca629ba2bdea6

    • SHA256

      3c311150e20d76edd9274cec783068667637b6b5f3b6e1a5031a8605b895fabf

    • SHA512

      f4be04961cb88e973af95e20148c0490b71010827994bc7266e84e93490142d2f8034ea59b13e4eed9c8acbf6bdbdbf0cf28cffc8f1492a68fe4bf02cb4f31ef

    • SSDEEP

      192:PC6XV89qHBGSVeZc3dqR8kl3v/bKyVET/qYCu/IT/qkQtRle:PCJsHBGSVeZ6dqR8W/HEjujWjl

    Score
    1/10
    • Target

      3efe068c644c96fff2a25a7351da85bad86949878df3c7cad76d83ad2f2c340f

    • Size

      15KB

    • MD5

      750c2cc91b6ce697aa6a5fc86108401f

    • SHA1

      701833cce3ead46257a02a791942dc6a549597de

    • SHA256

      3efe068c644c96fff2a25a7351da85bad86949878df3c7cad76d83ad2f2c340f

    • SHA512

      67517571c0b797c6f45be127b929149d1f73b10b560583971568e67493d4cc48a0fa918e5c6e384d46ee653271b9c2e02bab7d10135e52a9e279c337752cf51d

    • SSDEEP

      192:xYl8avdNcuhJkByinqIhiYAqbX+4dujUDOWizDA0qCWeI8gDOB5j+JW2:x9a8uhAvfO40IwDzftvj+JW

    Score
    3/10
    • Target

      403be0442e847aee7ca7553e19672112450f2e034180a1f57eb8a6d7d39b8d17

    • Size

      31KB

    • MD5

      408358751abe67dcf31de9a955253724

    • SHA1

      81c19445c96f0b4346ae6b4036ff18c8c44db0ed

    • SHA256

      403be0442e847aee7ca7553e19672112450f2e034180a1f57eb8a6d7d39b8d17

    • SHA512

      ffc1425bfca8e5e1b78a43bac829b8930ade14b017c12e0218c44e594f2d559ca9f2060b204eb07115f2bbd4111199ea061852f1742763cfdc80a9808e9bc8aa

    • SSDEEP

      384:bMBQl5CVzAW054SrIVuLRR0b3ZpUyXhVgeHy3jfSG+wKmOL1MCEdYdOiHNFx2khV:bMBQWVM6Srtlab7MC6wThw4

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops file in System32 directory

    • Target

      49c96478e9d2b16219a7c86f031c5d8b241ae43550ce2fc2bea1d98fa90aa766

    • Size

      27KB

    • MD5

      b7d21692e21dca23c0db28e171100b4a

    • SHA1

      64e399cbeea2d60bbe9f18946f53c80c2bcddcc2

    • SHA256

      49c96478e9d2b16219a7c86f031c5d8b241ae43550ce2fc2bea1d98fa90aa766

    • SHA512

      e80c688724813aa27f7fc7c82928d20c18dc7dbcb9e69f5ca8810e4b18f7cecef91bb0bf94774b4c0f8185592dabde09a849615cb51459fe7eed7478dd868e9e

    • SSDEEP

      768:HXTI4qP+S0kZu7jlvWTHY+H60xZbZ88OGoRnPKzc5:HXTI49kZu6uaBnAf5

    Score
    6/10
    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Target

      5154914351d1abdc308c8a76474a19560a4624194feb98118d0710efb6804aa7

    • Size

      15KB

    • MD5

      cd2ed5f84359389bf98749f49881975f

    • SHA1

      45ccaa58ac662408b7679f143042c03dc4c648c1

    • SHA256

      5154914351d1abdc308c8a76474a19560a4624194feb98118d0710efb6804aa7

    • SHA512

      692f4a48a3fad65aaaea3ba55a450aa47d65ee0ff0816ab50a61a147be9c4f7ce7df790209a0bd48d23746015a79ecbc683946565bc461c7303a1858b20e29c8

    • SSDEEP

      384:q3+NoNJcVEFxYWS9FXEvPIrUgWb3xw71dmve/hCMLXSn8/WrfI:qoVEFxYWS9FXEvKexed7jfWc

    Score
    1/10
    • Target

      616ea8ac34ae403d7094d53c0db11a24348f6e48eff80e254a93a1593f858437

    • Size

      10KB

    • MD5

      4a52a235c905d9d5d94e244fd7e351bf

    • SHA1

      bd2a7b8c3cf113f428c34d839ae2e2e54f216ebc

    • SHA256

      616ea8ac34ae403d7094d53c0db11a24348f6e48eff80e254a93a1593f858437

    • SHA512

      5cf43076a7e86546473946890474b6d804cac08400ed53399f4f2df59a7b2777187e82ac9e68ae8bb0e2855696fe8c3626d30f7f4204b74863ec9238846e6ba5

    • SSDEEP

      192:RO9MN8rITkgL2DDg7I+lm2MTgGI8dKYHeoiW7BKwP6v+aARLSD:k9MN/gk2QNlm2MTga4YHEW7BK0U+aARU

    Score
    1/10
    • Target

      6a637e90e0673ee6090cc4fb47d82ab87ae7d26ffcff7a7dcafd4da167aea8bc

    • Size

      30KB

    • MD5

      c2f261985677515ab220983bccfc1bee

    • SHA1

      21e324d2c8bd664a080c8fecbcd118ee040bb628

    • SHA256

      6a637e90e0673ee6090cc4fb47d82ab87ae7d26ffcff7a7dcafd4da167aea8bc

    • SHA512

      62066d26fdf71cd69903855ee569ae75ae520976ade784eaeb100d98c74a6b965abe371b9f14fc41a09e1a28b803dca13533b989d643ef21939ba6366cb029b8

    • SSDEEP

      768:jpiSqw4KqMqwZU/Tf+5g51qWMg6FU2btWLVkn:jeZqoTfwg5HMxpRWLVkn

    • Renames multiple (200) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Target

      759c06eedcadd60ebd2aa3790eefa40d505044080cea4e1477d845611f322b4c

    • Size

      38KB

    • MD5

      1f837affe14eeee652ae0271f0cb3804

    • SHA1

      5f55dad94a03100542c61777233f7846f9376625

    • SHA256

      759c06eedcadd60ebd2aa3790eefa40d505044080cea4e1477d845611f322b4c

    • SHA512

      a620bbb9b59fa93cff35d95c6c2000226361fcbcb869d4ec300caec97723802516a430d663e26c129b8c42f1ef9c27b90963896ac86207c7193513567850691b

    • SSDEEP

      768:FGcHvpu++E69ZxPGlISQAtxaYzUmFCL+4pO6Dzhc:Fju++E6XxPGlISR5UmoLTO2+

    Score
    10/10
    • Detect magniber ransomware

    • Magniber Ransomware

      Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (84) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Suspicious use of SetThreadContext

    • Target

      85cad059cca352e70188c1744521100651a787ebabdaa8261badb0f3b6bb5020

    • Size

      8KB

    • MD5

      4ad89788afc7a6dcf87a39a87f8adb84

    • SHA1

      c3069d84feb07f44bae94b794e47751ea66b1f39

    • SHA256

      85cad059cca352e70188c1744521100651a787ebabdaa8261badb0f3b6bb5020

    • SHA512

      ba8a64f796be593c1c191b5a5f58879e301403110f4f81dddf74203dbdc911e031d15b7be1a6fb612519bf2039732cc362b69c770bd13753e87e91a256978db1

    • SSDEEP

      96:CihvmFYq5HHjt9kuLn4n0i0ep+xeTlu7xTVZDyQf4JwzCWyzNt:CFFl5HDt9kuLn40igCK/ZoJwzD0

    Score
    1/10
    • Target

      8ca6b7929ece89d8d9050ae9f1e6c1b3dfa87217272e114e464160dce036463c

    • Size

      31KB

    • MD5

      310342183f3632361ced85fdf54b6370

    • SHA1

      5434cd3e67dd4b9bd06f2feb99a165dcf3535ae6

    • SHA256

      8ca6b7929ece89d8d9050ae9f1e6c1b3dfa87217272e114e464160dce036463c

    • SHA512

      e8f57e7fcb5a75b159e6c718d80d5354f1c4d8cffa17b06cf4b8c4367898520ac58405a42eb9119d04dece63dd5bbdeed2c876a59e8926d12d6a78a42790ccff

    • SSDEEP

      384:IU/nB6QSb+Pg+zb4UCmAGq9/KPCl+GVu8K8nZ0bzY3aysYenuJY9/oZqahhbRaAV:IU/nB6QSbcrCoEyClQESbWMccahhtaA

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (1636) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Target

      90ef3f841bef457a352a092f2367a0de89d812318df6b2293876d5746281c777

    • Size

      44KB

    • MD5

      112b36f6f558870ac332c6a86c0a9d83

    • SHA1

      faadf24ab626dcf13889b053503b3587b34d3107

    • SHA256

      90ef3f841bef457a352a092f2367a0de89d812318df6b2293876d5746281c777

    • SHA512

      1b88a607322b0a82be045d98870ff075fc2a9fd531f9c4fba799adc893830e1c4a69e2b23f88bc8b30f7943e2b42942efb2c998eddc6fa3e42c458e42e75cc20

    • SSDEEP

      384:ooQ3deOtEwC31/SllHgu/zhD+wFNf1cshmmfHsMDRiegZRF5jpmRaaaS2W:WUuB5N1KjtB3W

    • Renames multiple (172) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks

static1

ransomware
Score
10/10

behavioral1

Score
1/10

behavioral2

Score
1/10

behavioral3

Score
1/10

behavioral4

Score
1/10

behavioral5

Score
1/10

behavioral6

Score
1/10

behavioral7

Score
1/10

behavioral8

Score
1/10

behavioral9

Score
1/10

behavioral10

Score
1/10

behavioral11

Score
1/10

behavioral12

Score
1/10

behavioral13

Score
3/10

behavioral14

Score
3/10

behavioral15

ransomwarespywarestealer
Score
10/10

behavioral16

ransomwarespywarestealer
Score
10/10

behavioral17

discovery
Score
6/10

behavioral18

discovery
Score
6/10

behavioral19

Score
1/10

behavioral20

Score
1/10

behavioral21

Score
1/10

behavioral22

Score
1/10

behavioral23

ransomwarespywarestealer
Score
10/10

behavioral24

ransomwarespywarestealer
Score
9/10

behavioral25

magniberransomware
Score
10/10

behavioral26

magniberransomware
Score
10/10

behavioral27

Score
1/10

behavioral28

Score
1/10

behavioral29

ransomwarespywarestealer
Score
10/10

behavioral30

ransomwarespywarestealer
Score
9/10

behavioral31

ransomwarespywarestealer
Score
9/10

behavioral32

ransomwarespywarestealer
Score
9/10