General

  • Target

    2024-03-27_b7e8e0567db150e37da87c40c51132ca_crysis_dharma

  • Size

    92KB

  • Sample

    240327-3g5c8agg5z

  • MD5

    b7e8e0567db150e37da87c40c51132ca

  • SHA1

    adf32e292490aaa3487b91d7d5ff5881045e242c

  • SHA256

    fd3a4710e21b89324240728ee99cba2c71b54cfb03d4fc742b47de068e45f608

  • SHA512

    7220502bc12e222a08ca0d0edeae5b7dca2f8dfa2355a5ba6492044b775a01ccbf3aa2c8237e12ebd48ea886cfca9c05fbf1d6aa020773448fe36378a65201ff

  • SSDEEP

    1536:mBwl+KXpsqN5vlwWYyhY9S4Aziddu4MN0+MTFYzpn58div+2AaKj:Qw+asqN5aW/hL9ud8PMTFY558dGAa

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta

Ransom Note
All FILES ENCRYPTED "RSA1024" All YOUR FILES HAVE BEEN ENCRYPTED!!! IF YOU WANT TO RESTORE THEM, WRITE US TO THE E-MAIL [email protected] IN THE LETTER WRITE YOUR ID, YOUR ID C136F865 IF YOU ARE NOT ANSWERED, WRITE TO EMAIL: [email protected] YOUR SECRET KEY WILL BE STORED ON A SERVER 7 DAYS, AFTER 7 DAYS IT MAY BE OVERWRITTEN BY OTHER KEYS, DON'T PULL TIME, WAITING YOUR EMAIL FREE DECRYPTION FOR PROOF You can send us up to 1 file for free decryption. The total size of files must be less than 1Mb (non archived), and files should not contain valuable information. (databases,backups, large excel sheets, etc.) DECRYPTION PROCESS: When you make sure of decryption possibility transfer the money to our bitcoin wallet. As soon as we receive the money we will send you: 1. Decryption program. 2. Detailed instruction for decryption. 3. And individual keys for decrypting your files. !WARNING! Do not rename encrypted files. Do not try to decrypt your data using third party software, it may cause permanent data loss. Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.

Extracted

Path

C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta

Ransom Note
All FILES ENCRYPTED "RSA1024" All YOUR FILES HAVE BEEN ENCRYPTED!!! IF YOU WANT TO RESTORE THEM, WRITE US TO THE E-MAIL [email protected] IN THE LETTER WRITE YOUR ID, YOUR ID 2C9D4FBC IF YOU ARE NOT ANSWERED, WRITE TO EMAIL: [email protected] YOUR SECRET KEY WILL BE STORED ON A SERVER 7 DAYS, AFTER 7 DAYS IT MAY BE OVERWRITTEN BY OTHER KEYS, DON'T PULL TIME, WAITING YOUR EMAIL FREE DECRYPTION FOR PROOF You can send us up to 1 file for free decryption. The total size of files must be less than 1Mb (non archived), and files should not contain valuable information. (databases,backups, large excel sheets, etc.) DECRYPTION PROCESS: When you make sure of decryption possibility transfer the money to our bitcoin wallet. As soon as we receive the money we will send you: 1. Decryption program. 2. Detailed instruction for decryption. 3. And individual keys for decrypting your files. !WARNING! Do not rename encrypted files. Do not try to decrypt your data using third party software, it may cause permanent data loss. Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.

Targets

    • Target

      2024-03-27_b7e8e0567db150e37da87c40c51132ca_crysis_dharma

    • Size

      92KB

    • MD5

      b7e8e0567db150e37da87c40c51132ca

    • SHA1

      adf32e292490aaa3487b91d7d5ff5881045e242c

    • SHA256

      fd3a4710e21b89324240728ee99cba2c71b54cfb03d4fc742b47de068e45f608

    • SHA512

      7220502bc12e222a08ca0d0edeae5b7dca2f8dfa2355a5ba6492044b775a01ccbf3aa2c8237e12ebd48ea886cfca9c05fbf1d6aa020773448fe36378a65201ff

    • SSDEEP

      1536:mBwl+KXpsqN5vlwWYyhY9S4Aziddu4MN0+MTFYzpn58div+2AaKj:Qw+asqN5aW/hL9ud8PMTFY558dGAa

    • Dharma

      Dharma is a ransomware that uses security software installation to hide malicious activities.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (314) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks