Resubmissions

27-05-2024 13:08

240527-qdam8aeg57 10

General

  • Target

    16624848690.zip

  • Size

    3.0MB

  • Sample

    240413-tftewsef65

  • MD5

    712df307ec075c3b70eea428bc793c43

  • SHA1

    600b6743f7a9a8c45c6f2f8b01bed4f05eaca13a

  • SHA256

    91ea14d78a9a318e396575b9f5dd8eb3c03657067cd3d0dd382c209b78d0dee2

  • SHA512

    8b84135eb8eafc1fe341e867f2c14837d7ad1d2aa0890fe8e64a04583d607b171a638902fcbf73f68d284ba5c7d031bad68945cc5cad920211d8672953c48b81

  • SSDEEP

    49152:x3s1rWUM6tv5Bae9LDfvE9DXvM/d7tjcZIIwnXXtuiFuJiTW48CEOKsmLxpB4hAV:GzM6tj9vk7vMzczwXXtwb48CEvxL2J+p

Score
10/10

Malware Config

Extracted

Family

agenda

Credentials
Attributes
  • company_id

    OKJRM-RKPy

  • note

    -- Qilin Your network/system was encrypted. Encrypted files have new extension. -- Compromising and sensitive data We have downloaded compromising and sensitive data from you system/network If you refuse to communicate with us and we do not come to an agreement, your data will be published. Data includes: - Employees personal data, CVs, DL , SSN. - Complete network map including credentials for local and remote services. - Financial information including clients data, bills, budgets, annual reports, bank statements. - Complete datagrams/schemas/drawings for manufacturing in solidworks format - And more... -- Warning 1) If you modify files - our decrypt software won't able to recover data 2) If you use third party software - you can damage/modify files (see item 1) 3) You need cipher key / our decrypt software to restore you files. 4) The police or authorities will not be able to help you get the cipher key. We encourage you to consider your decisions. -- Recovery 1) Download tor browser: https://www.torproject.org/download/ 2) Go to domain 3) Enter credentials-- Credentials Extension: OKJRM-RKPy Domain: ftx4rx6n4wp6fu57awd5p52l2xbmtknea26dtuwr3dalrixfuytiluad.onion login: h1ykctMTqqda69-Kts9Oe-4C0FdDdT69 password:

rsa_pubkey.plain

Targets

    • Target

      a25097d2ae808df410c2f35d725a500fb680f38605e62c9e3b619e389ef6733f

    • Size

      5.0MB

    • MD5

      1410b418a078559581725d14fa389cdd

    • SHA1

      081cd6c242d472db9148fd0ce33346f7a3e87ac2

    • SHA256

      a25097d2ae808df410c2f35d725a500fb680f38605e62c9e3b619e389ef6733f

    • SHA512

      4d7a06d34208b69a338cefeb3d676b37358c236e604926a351db50dfe27d24acab6ac186c3343611fde92dc45072e3e922883eafa863243a117fdf3b2ec48676

    • SSDEEP

      49152:piU0bmF9imb6ApZ017p2fM0EBmYPhwOj45/oAsl11PO3gUJGzwryAFsF/s7u4CCT:pb5FcWg1kibj45QAusGzwryWS/s70CT

    Score
    10/10
    • Agenda Ransomware

      A ransomware with multiple variants written in Golang and Rust first seen in August 2022.

MITRE ATT&CK Matrix

Tasks