Resubmissions

30-01-2024 00:37

240130-ayymsafdfm 10

29-01-2024 14:14

240129-rj1x2adadr 10

General

  • Target

    5cf6d2669348a6d1652a6cc16734b8ad9d8684658da92236194a939542242df5.zip

  • Size

    1.1MB

  • Sample

    240129-rj1x2adadr

  • MD5

    ff6bf6b3c0cdb3a9a5d853b59258184d

  • SHA1

    11c6571e90ad8d792f5b2215659e9f386f5dc4cc

  • SHA256

    679840d8a5aa5a30bc24fc0e03024fb3b447521540eb41ed6227436f6b7b8555

  • SHA512

    86806d7d1f789d6f53f812ce068ac99a8b0499ca31d7f684648c3a384c5547a682202653c615c3b98c9786fa666fc6e7e1d00a1740154ab01289cf15e4b70de0

  • SSDEEP

    24576:x1/KKFKG26jRJICw4uBbOVNk+BRTtgQkMMmGB6TjL2pKuAuajDzuUo:+n5cPIOY+NtJgQkIZuAj/zI

Malware Config

Extracted

Path

F:\$RECYCLE.BIN\S-1-5-21-3627615824-4061627003-3019543961-1000\ReadMe.txt

Ransom Note
to recover your data install telgram messanger at @seclesbot ( https://t.me/secles1bot ) you will talk with support using the bot , admin will be monitoring if for any reason bot is not avaiable you can find link and id of new bot at our onion site 2kksm7oobarkoedfnkihgsa2qdvfgwvr4p4furcsopummgs5y37s6bid.onion you will need to install tor browser for onion sites ( https://www.torproject.org/download/ ) you dont need to install tor if our telegram bot is working, the bot gets banned once a while you id is : AM3BEf5J you will get two sample decryption (decoding) before any payment for free this is strong ransomware, any day you waste without paying is one business day you waste our price is reasonable,the wasted days will cost you more some notes: 1-although illegal and bad but this is business,you are our client after infection and we will treat you respectfully like a client 2-do not delete files at c:\secles , if you want to reinstall windwos take a backup of the folder (dont waste time trying to get anything out of them ,they are encrypted with out public key and cant be read without our private keys) 3-do not play with encrypted file, take a backup if you want to waste some time playing with them 4-if you take a middleman do deal with us directly , take one with good reputation ,we always provide decryptor after payment and only ask for one payment , if you take a random middle man from internet he may take you money and not pay as and disappear or lie to you 5-police can't help you , we are excpericed hackers and we don't leave footprints behind , even if we did police wont risk ther million dollar worth zero day exploits for catching us, instead what they do get sure of is you never pay us and you suffer loss your data 6-if some of your files don't have our extention but do not open ,they are encrypted all other files and will decrypt normally ,they just have not been renamed to get our extension
URLs

https://t.me/secles1bot

http://2kksm7oobarkoedfnkihgsa2qdvfgwvr4p4furcsopummgs5y37s6bid.onion

Extracted

Path

F:\$RECYCLE.BIN\ReadMe.txt

Ransom Note
to recover your data install telgram messanger at @seclesbot ( https://t.me/secles1bot ) you will talk with support using the bot , admin will be monitoring if for any reason bot is not avaiable you can find link and id of new bot at our onion site 2kksm7oobarkoedfnkihgsa2qdvfgwvr4p4furcsopummgs5y37s6bid.onion you will need to install tor browser for onion sites ( https://www.torproject.org/download/ ) you dont need to install tor if our telegram bot is working, the bot gets banned once a while you id is : XVYFFnHX you will get two sample decryption (decoding) before any payment for free this is strong ransomware, any day you waste without paying is one business day you waste our price is reasonable,the wasted days will cost you more some notes: 1-although illegal and bad but this is business,you are our client after infection and we will treat you respectfully like a client 2-do not delete files at c:\secles , if you want to reinstall windwos take a backup of the folder (dont waste time trying to get anything out of them ,they are encrypted with out public key and cant be read without our private keys) 3-do not play with encrypted file, take a backup if you want to waste some time playing with them 4-if you take a middleman do deal with us directly , take one with good reputation ,we always provide decryptor after payment and only ask for one payment , if you take a random middle man from internet he may take you money and not pay as and disappear or lie to you 5-police can't help you , we are excpericed hackers and we don't leave footprints behind , even if we did police wont risk ther million dollar worth zero day exploits for catching us, instead what they do get sure of is you never pay us and you suffer loss your data 6-if some of your files don't have our extention but do not open ,they are encrypted all other files and will decrypt normally ,they just have not been renamed to get our extension
URLs

https://t.me/secles1bot

http://2kksm7oobarkoedfnkihgsa2qdvfgwvr4p4furcsopummgs5y37s6bid.onion

Targets

    • Target

      5cf6d2669348a6d1652a6cc16734b8ad9d8684658da92236194a939542242df5

    • Size

      1.1MB

    • MD5

      cbd091cac452f86c94499f712c7fb79b

    • SHA1

      01d48986d1edfdcca9c2585325f37888b2b3ec84

    • SHA256

      5cf6d2669348a6d1652a6cc16734b8ad9d8684658da92236194a939542242df5

    • SHA512

      25be58c4c490e209c1f0d43bd03e488833d44c6e00b65d84e4c2871bab5bd5415c6e2b4b8db2c03a3c6c7f8e63572b7c2372f002b17577bcc7ce9318bf71e17b

    • SSDEEP

      24576:XBvcNWXatHPiAcShw1cLCY0NH1LxLv8cGBVrXF5QecdGPyGLAB:xvcDtjpMHNJt8cwdFO2adB

    • Clears Windows event logs

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (9597) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Creates new service(s)

    • Deletes backup catalog

      Uses wbadmin.exe to inhibit system recovery.

    • Drops file in Drivers directory

    • Modifies Installed Components in the registry

    • Stops running service(s)

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks