Resubmissions

09-03-2024 13:55

240309-q77j2saa7s 10

09-03-2024 12:43

240309-pya9tafh65 10

General

  • Target

    BOULEVARD.txt

  • Size

    885KB

  • Sample

    240309-pya9tafh65

  • MD5

    497ef4779c6770e4497adf0bc71655f1

  • SHA1

    328a8793323f11c1d0c5f3ddedf4ae10caafb063

  • SHA256

    62e63388953bb30669b403867a3ac2c8130332cf78133f7fd4a7f23cdc939087

  • SHA512

    35c2c131a84205ecda974fc0cdf93db38184547586c28671379b13b98311289459b5b87c6c8ffa3233ccd42953d4faef47e27195ecd40011cc72cbf3b3e5af35

  • SSDEEP

    24576:pAWf/LUup7zmMl8tOKnvwYQ62jaeekMEoBmn64:pTUS2Ml8trnvwYQ62japkMEQS64

Malware Config

Extracted

Path

C:\Program Files\instructions_read_me.txt

Family

blackbasta

Ransom Note
ATTENTION! Your network has been breached and all data was encrypted. Please contact us at: https://bastad5huzwkepdixedg2gekg7jk22ato24zyllp6lnjx7wdtyctgvyd.onion/ Login ID: 91ff2d86-ecd6-429f-9cfe-ef43ac53155b *!* To access .onion websites download and install Tor Browser at: https://www.torproject.org/ (Tor Browser is not related to us) *!* To restore all your PCs and get your network working again, follow these instructions: - Any attempts to modify, decrypt or rename the files will lead to its fatal corruption. It doesn't matter, who are trying to do this, either it will be your IT guys or a recovery agency. Please follow these simple rules to avoid data corruption: - Do not modify, rename or delete files. Any attempts to modify, decrypt or rename the files will lead to its fatal corruption. - Do not hire a recovery company. They can't decrypt without the key. They also don't care about your business. They believe that they are good negotiators, but it is not. They usually fail. So speak for yourself. Waiting you in a chat.
URLs

https://bastad5huzwkepdixedg2gekg7jk22ato24zyllp6lnjx7wdtyctgvyd.onion/

Targets

    • Target

      BOULEVARD.txt

    • Size

      885KB

    • MD5

      497ef4779c6770e4497adf0bc71655f1

    • SHA1

      328a8793323f11c1d0c5f3ddedf4ae10caafb063

    • SHA256

      62e63388953bb30669b403867a3ac2c8130332cf78133f7fd4a7f23cdc939087

    • SHA512

      35c2c131a84205ecda974fc0cdf93db38184547586c28671379b13b98311289459b5b87c6c8ffa3233ccd42953d4faef47e27195ecd40011cc72cbf3b3e5af35

    • SSDEEP

      24576:pAWf/LUup7zmMl8tOKnvwYQ62jaeekMEoBmn64:pTUS2Ml8trnvwYQ62japkMEQS64

    • Black Basta

      A ransomware family targeting Windows and Linux ESXi first seen in February 2022.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks