General

  • Target

    846a53042aa2ec1790fec4d1ec40e66b7abe83bab1718f14fefe051744b21378.sample

  • Size

    333KB

  • Sample

    240227-wcq7gafg3v

  • MD5

    0fc26e931a324948a7d5e5a0008bf3c7

  • SHA1

    aa6018a65a0ae90d33451dd8f4fc647179ee93e1

  • SHA256

    846a53042aa2ec1790fec4d1ec40e66b7abe83bab1718f14fefe051744b21378

  • SHA512

    95dd8fd0973ac6166fda194b90e84f57d637ca3e1954733b19446abcd13ee89c09388bddf626cf9ee4aace8d1097e244865c50738accee3adcf03b3321c6d5d3

  • SSDEEP

    6144:gq9ezqsEC8dS7CCKUf+9xwL1ZTcDCzyrxQX3hVds+tfCOu3miq/8g7iXq:g4JsE3CKUf+9xwL15cDCzie1ChRnXq

Malware Config

Extracted

Path

\Device\HarddiskVolume1\Boot\how_to_back.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; word-break: break-all; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">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</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion</a><br> * Note that this server is available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion<br> </a> 4. Start a chat and follow the further instructions. <br> <hr> <b>If you can not use the above link, use the email:</b><br> <a href="[email protected] ">[email protected] </a> <br> <a href="[email protected] ">[email protected] </a> <br> <p>* To contact us, create a new free email account on the site: <a href="https://protonmail.com">protonmail.com <br> <b> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Extracted

Path

\Device\HarddiskVolume1\Boot\bg-BG\how_to_back.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; word-break: break-all; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">bs1nFqiMvnltjzWY/ZOpVji6rXGPKYmp20qkL8Tbdumi0JF+etuLJKBchhq95o+hvYQjR89ztmLeV8ovLD5OIi42OFHY/HmJqsGaOGoNxS/CooiZwwQeToV1whfLUwkpC74HQcZHtchiDEc/ilMuymggtoj+t/+m7KmhmUH8RO7clpoMe2WwLWKP1WECt+Gss3xVCpKmZgzAeKoL1iLob/8DAPn2oTcz6WpcKwOhuPLb8TfNX5fDX2YsdNjXy9fYMgeu5XzRu1fVL/fXU5us8U33obwoTDIDKVLBZzP+EwKuglyIYL3M5T1Gn5hPg0mlr9tk62uXsnzUGnKni41DW0VgVM4xTz1hzalLLqJ4qZKiI1LHYEHVq5mS3Csq2TG6evquGXRRXoTJWDQehvVET21hKd6DgNamnLC4UXUbgBqZ1ZnGhyB4cWYPAMNIhQRYukXxp7pMLsPgkMMZy5XPzXefUCFIlS3dLWAOysXVz7gFKLIhByU5GLOSitLerKhCymLrNKBTx7vs40zckczMSAsZ6pWVNBaGskv+1iy4AfYdqvsWgYw4akvbQtjDRYCyylicAVxZ33msUnEuCK9Nw5WuEBBbvtgUI6AuqhNwVsuxJPoa5JgoKypH4D/pVfl7BmmUT9FiDQ1rvp3oO3qL6b2VV1uX4vbqCiWl7wluekFNDt8Z9SrgFequhFCgeXOK4vntkinUIsBSxIFT7QgZOZxWBymTZfrJhqPIDQm8NVsYz2K/Ui1V6a8oVrmY7Vw/upayInNXazaS8s89AaSd+E39AAN7le2Fse/T5Xeew+P3MYRE3TQwfP5yeLk+GSxIeFRGSGtuqDOWbIiE2xieZm26lQeIWhWi1A4qokS/q/fFeT95HZfpD+zi/XKjvqIeehQv6OYy6sBkPQ29BAHal8FxV7XuJZMZhOvZL0fqG0ntZooBEd3VWmt4k6St0bWPWgsv8BgedEqfZWFbu8L2SASE49cEDnMSYDc3UO6KaCDLvHTo9mvgSgizRqGSBE4gKBmAzT8xT4fxk18tesFaI+veV9ZCsUZk3XO+kUsDGVgd1kK1/PI5LiPx6dMcOlGy8XYtcp6DF8btV3v1eUuRU6fH2UB8wEdllCIQE6FCu5BS/Z7ljIGRREoiFIn1JoWA+CMHC5AbuOUlIfVCaVXacYOiOwY7PtjQW0/5gG0OtUmXpSr5Ql4ap3057rjVtz9zCPaerVPkDQAqG7mytxQsEGX96qval7xCt8dm+oUQLj/OW64iZ34I+KffBQxZCF0GYmhBBQnmXPpEfvag9CqAyJ3YYqYMGYLaqhwBcT9Mm/A0tBqCKtelk3skRC6kqSPPW7PDE2imY3GOLr5KR5IMa76oILGi1d3bbcUmjTSN/VTds5aZ7HHWFzEC6TCeNLVkzu5xvr2C181IO8KsBKxTrVo8zPTdwXhwarOuZyndcAprQZxbOSkUE79Co2jMOFqRk8kamW2nmt9GP/vOmYVEAKPQpFOMEc0hmWaSMemFPL+vSvnYpQJJAb5YaakkWA9H3H3OEvwkrSaW/nCfaxmXF0wNUFRo5CZ6RL2n7NsTPFfYHp+jBrk9J9xPSbI+Y0OiJ1VpG+6rB9eWbOJAG4clA7DJISkAncyOnY0McXGB9SztZVQBf+3fvsac9YcSuKmemflt+d5oPYfuOWw0bvzKzGC9w+/08cdCy1E1ycImUhc=</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion</a><br> * Note that this server is available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion<br> </a> 4. Start a chat and follow the further instructions. <br> <hr> <b>If you can not use the above link, use the email:</b><br> <a href="[email protected] ">[email protected] </a> <br> <a href="[email protected] ">[email protected] </a> <br> <p>* To contact us, create a new free email account on the site: <a href="https://protonmail.com">protonmail.com <br> <b> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Targets

    • Target

      846a53042aa2ec1790fec4d1ec40e66b7abe83bab1718f14fefe051744b21378.sample

    • Size

      333KB

    • MD5

      0fc26e931a324948a7d5e5a0008bf3c7

    • SHA1

      aa6018a65a0ae90d33451dd8f4fc647179ee93e1

    • SHA256

      846a53042aa2ec1790fec4d1ec40e66b7abe83bab1718f14fefe051744b21378

    • SHA512

      95dd8fd0973ac6166fda194b90e84f57d637ca3e1954733b19446abcd13ee89c09388bddf626cf9ee4aace8d1097e244865c50738accee3adcf03b3321c6d5d3

    • SSDEEP

      6144:gq9ezqsEC8dS7CCKUf+9xwL1ZTcDCzyrxQX3hVds+tfCOu3miq/8g7iXq:g4JsE3CKUf+9xwL15cDCzie1ChRnXq

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies boot configuration data using bcdedit

    • Renames multiple (7570) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Deletes System State backups

      Uses wbadmin.exe to inhibit system recovery.

    • Modifies Installed Components in the registry

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks