General

  • Target

    82fabe7611dff81affd39733a833c5de9994bce8994fa184535c8b62cf72247b.sample

  • Size

    415KB

  • Sample

    240227-wcjsdsfg3s

  • MD5

    ff99b9afd11f39f9bbd0acfdf5fc0e16

  • SHA1

    291a6b206584602a76eaff6c750bc94962c4b621

  • SHA256

    82fabe7611dff81affd39733a833c5de9994bce8994fa184535c8b62cf72247b

  • SHA512

    11b1a48c1e4ab7f9ca3383438543f04746605b8f389783c794ad3c34a6d62970c422ac9cab0124abd1bc622b9e640e866bbd43c8fe6479640f32212460e60259

  • SSDEEP

    6144:7/2pAAzX2K6wh8hymOxxIR3/LAs4RumG/vV4UWFfhai3MbmBYL:j2F19OaxiB/LAGNl43wvKM

Malware Config

Extracted

Path

C:\MSOCache\HOW_TO_BACK_FILES.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; word-break: break-all; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">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</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion</a><br> * Note that this server is available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion<br> </a> 4. Start a chat and follow the further instructions. <br> <hr> <b>If you can not use the above link, use the email:</b><br> <a href="[email protected] ">[email protected] </a> <br> <a href="[email protected] ">[email protected] </a> <br> <p>* To contact us, create a new free email account on the site: <a href="https://protonmail.com">protonmail.com <br> <b> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Extracted

Path

C:\odt\HOW_TO_BACK_FILES.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; word-break: break-all; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">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</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion</a><br> * Note that this server is available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion<br> </a> 4. Start a chat and follow the further instructions. <br> <hr> <b>If you can not use the above link, use the email:</b><br> <a href="[email protected] ">[email protected] </a> <br> <a href="[email protected] ">[email protected] </a> <br> <p>* To contact us, create a new free email account on the site: <a href="https://protonmail.com">protonmail.com <br> <b> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Targets

    • Target

      82fabe7611dff81affd39733a833c5de9994bce8994fa184535c8b62cf72247b.sample

    • Size

      415KB

    • MD5

      ff99b9afd11f39f9bbd0acfdf5fc0e16

    • SHA1

      291a6b206584602a76eaff6c750bc94962c4b621

    • SHA256

      82fabe7611dff81affd39733a833c5de9994bce8994fa184535c8b62cf72247b

    • SHA512

      11b1a48c1e4ab7f9ca3383438543f04746605b8f389783c794ad3c34a6d62970c422ac9cab0124abd1bc622b9e640e866bbd43c8fe6479640f32212460e60259

    • SSDEEP

      6144:7/2pAAzX2K6wh8hymOxxIR3/LAs4RumG/vV4UWFfhai3MbmBYL:j2F19OaxiB/LAGNl43wvKM

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies boot configuration data using bcdedit

    • Renames multiple (7520) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Deletes System State backups

      Uses wbadmin.exe to inhibit system recovery.

    • Modifies Installed Components in the registry

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks