General

  • Target

    0d148218983f96167795e70053b0960d5a501a30b3c45e626e9228af49af2248.zip

  • Size

    4.6MB

  • Sample

    240418-wgm1lsbh9z

  • MD5

    30686aacaad7be4fbba49d5f6ac34b88

  • SHA1

    fcf1ee0542293be4c5a2649c1802b4bde64a0d96

  • SHA256

    0c4864599b52de471326f4f5e7a2096ee1820bb3411b0c43ecd1bae389d1ad5d

  • SHA512

    188ef4c937447c0a230bfc3e0538c2a7630e020c8f4fbc6c6902cbc7af3d7f35d917d9884e62423b80d7ec241ad99615ad3d23669db1b0b894cb3af3c46d9e5e

  • SSDEEP

    98304:8YHzhleY+9RCvfTolwHGivpU/HgZE7bq6alyfJsrMUBxcPOAodU:9H7ArCvLolAh4mKfqrVLcGXU

Malware Config

Extracted

Path

C:\Program Files\7-Zip\Lang\ÊÀÊ ÐÀÑØÈÔÐÎÂÀÒÜ ÔÀÉËÛ.txt

Ransom Note
All your files have been encrypted due to a security issue with your computer. If you want to restore them, email us Telegram @root_backdoor_synaptics_V,@DosX_Plus,@Cinoshi_Adm,@ac3ss0r Specify this identifier in the header of your message - XFQCF$GWE@ If there is no response within 24 hours, write to us in this telegram account:@DosX_Plus You have to pay to decrypt the malware. The amount depends on how quickly you write to us. After sending, we will send you a decryption tool that will decrypt all your files. LiteCoin: MCwRK1Z7K4GYHt9ZrbTR2SMCEqzqQaTbRF USDT (ERC-20): 0x334F093c9De6552AF4cC0B252dA82aC77FeB467D Free decryption as a guarantee Before sending, you can send us up to 5 files for free decryption. The total size of the files should be less than 10 MB (unarchived), and the files should not contain valuable information. (databases, backups, large Excel sheets, etc.) Buy a buyback https://kay-software.ru
URLs

https://kay-software.ru

Targets

    • Target

      0d148218983f96167795e70053b0960d5a501a30b3c45e626e9228af49af2248.exe

    • Size

      4.7MB

    • MD5

      1df3028b6a1e41a393bb542df2274145

    • SHA1

      332899d8f3e304a4447bc7256bbc127c34303291

    • SHA256

      0d148218983f96167795e70053b0960d5a501a30b3c45e626e9228af49af2248

    • SHA512

      a73115bb838839a1a0a2e4033265422e37eba53cbd295277f5139a1a223bbd2cc3381355069269943f82f834cb6eeec36c5b41c7ab98fa89b9fce03903003308

    • SSDEEP

      98304:jbxXg98fQNhyC+Dt1RA9hgpG3qhWXLpSwlzf9UT7fJ/sBo4:jp1fQNhN0EgpTWXLpS8ZGx/sBo4

    • Detected Xorist Ransomware

    • Xorist Ransomware

      Xorist is a ransomware first seen in 2020.

    • Renames multiple (6483) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Drops file in Drivers directory

    • Manipulates Digital Signatures

      Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Tasks