General

  • Target

    33f658a424fa30b55ddddaaf3c738b7e61d4949a777ea8f633fcbcb5fb436580

  • Size

    22KB

  • Sample

    240419-wzk9qscf71

  • MD5

    c118fc46d74d08285ce1b5a3822a5c2f

  • SHA1

    d9dbd55763267a49ee8a472753ee27af8f1fa1a9

  • SHA256

    33f658a424fa30b55ddddaaf3c738b7e61d4949a777ea8f633fcbcb5fb436580

  • SHA512

    daac3aa0197a649973fffdfe5fe6fc26d2c471de6ac412049fb1d133a6018cc571e7d2787d7c640f728ba618b775c684720299589bbd5b03c31796f19e937ecb

  • SSDEEP

    384:DHJDXfQn0sy0ASe6KSe3rlbDYM2tJcyl/Ex+gtvy7tz0/1xf/Cxx9KmFteVlq:xQn31e6ReblbL2bZOx+gtvy7Mfn43vFP

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\readme-warning.txt

Family

makop

Ransom Note
::: Greetings ::: Little FAQ: .1. Q: Whats Happen? A: Your files have been encrypted and now have the "fair" extension. The file structure was not damaged, we did everything possible so that this could not happen. .2. Q: How to recover files? A: If you wish to decrypt your files you will need to pay in bitcoins. .3. Q: What about guarantees? A: Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will cooperate with us. Its not in our interests. To check the ability of returning files, you can send to us any 2 files with SIMPLE extensions(jpg,xls,doc, etc... not databases!) and low sizes(max 1 mb), we will decrypt them and send back to you. That is our guarantee. .4. Q: How to contact with you? A: You can write us to our mailbox: fairexchange@qq.com .5. Q: How will the decryption process proceed after payment? A: After payment we will send to you our scanner-decoder program and detailed instructions for use. With this program you will be able to decrypt all your encrypted files. .6. Q: If I don�t want to pay bad people like you? A: If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause only we have the private key. In practice - time is much more valuable than money. :::BEWARE::: DON'T try to change encrypted files by yourself! If you will try to use any third party software for restoring your data or antivirus solutions - please make a backup for all encrypted files! Any changes in encrypted files may entail damage of the private key and, as result, the loss all data.
Emails

fairexchange@qq.com

Targets

    • Target

      2cadd0ff146e1cdf1270894be4fb1523bfdcc7a31760e0ca5cfd9d8e6b525c21

    • Size

      35KB

    • MD5

      6ad6c98f75c3133b94026c2fdd06a6f1

    • SHA1

      163dcb0b3da0c55dbbea71e55d47222c0162f650

    • SHA256

      2cadd0ff146e1cdf1270894be4fb1523bfdcc7a31760e0ca5cfd9d8e6b525c21

    • SHA512

      65ef60fdf4d986743cc60f4867d618aaf223513d2d61b6631226cdf1fd8e92168a1b2eee565d197716a7bc6718db093fc8020a20039a6041376cdd2d05ce2e12

    • SSDEEP

      768:XnO6+QwxSRYG1lcjR4Q+aKj+XzMogluDAnMNJxKMh:XZ+QXSG1SjRryo5AnIJxKa

    • Makop

      Ransomware family discovered by @VK_Intel in early 2020.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (8296) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Deletes backup catalog

      Uses wbadmin.exe to inhibit system recovery.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Indicator Removal

3
T1070

File Deletion

3
T1070.004

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Impact

Inhibit System Recovery

3
T1490

Tasks