General

  • Target

    240219-kqmwesbe6x_pw_infected.zip

  • Size

    241KB

  • Sample

    240219-kxt83sbf3y

  • MD5

    aa1504b2837acbcdb723e96ae63763e9

  • SHA1

    e0200905774c8919105ce42a66ae2e9688d79719

  • SHA256

    334081064208e3e430479877e6a730d9458073388422ad7d9da8084c41c38ff9

  • SHA512

    c5f0d31f14c88a81a490984926715bb984fdd8a8f895c049a2709b65c908a5a08e62c080bcb494004482ac8c6ccab3dc8abeb4049cdd8c6d0fc34c1c5d54e28c

  • SSDEEP

    3072:imKvYfgp0mrewhOBEBmvbhw/QKxKzfAO5q1DLgtBtrMbE/0PRdO5E2+qZT+gNiQH:iFcgpHbVU1wcAOQ1DmSPXwE2+qAsd7N

Malware Config

Extracted

Path

C:\Users\Admin\Documents\read_it.txt

Ransom Note
---->hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh<---- All of your files have been encrypted Your computer was infected with a ransomware virus. Your files have been encrypted and you won't be able to decrypt them without our help.What can I do to get my files back?You can buy our special decryption software, this software will allow you to recover all of your data and remove the ransomware from your computer.The price for the software is $1,500. Payment can be made in Bitcoin only. How do I pay, where do I get Bitcoin? Purchasing Bitcoin varies from country to country, you are best advised to do a quick google search yourself to find out how to buy Bitcoin. Many of our customers have reported these sites to be fast and reliable: Coinmama - hxxps://www.coinmama.com Bitpanda - hxxps://www.bitpanda.com Payment informationAmount: 0.0093766 BTC Bitcoin Address: bc1q50rfpqz5qxfulaqj4krv92ue7kzvugl460070j Contact! -Email/ [email protected] -Insta/ @mark_t_er -Telegram/ @haker6657

Targets

    • Target

      2024-02-19_a9282aaf372aae86092f21917022850c_wannacry

    • Size

      551KB

    • MD5

      a9282aaf372aae86092f21917022850c

    • SHA1

      6d06e70de7c4478da89123dde9c0ea4dfb33c6e3

    • SHA256

      35196a8b628306eff560e2ec0228a51acfc7a232878b233b18de68806e9b55db

    • SHA512

      865bffacbd2bc67476144470165c119674c9b3736187757bba3157cc1f0eeafd747f08b1232aabbf0e1b76afc8e6bf9bdc2f6d5fd5eae7d38540a27e33883708

    • SSDEEP

      12288:dsGmPS60AOrFQANpH5WH9d7W4mBm1wRc/8BThysr8E:dsB2udYBmMbZrT

    • Chaos

      Ransomware family first seen in June 2021.

    • Chaos Ransomware

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies boot configuration data using bcdedit

    • Deletes backup catalog

      Uses wbadmin.exe to inhibit system recovery.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks