Resubmissions

28-04-2024 19:36

240428-ybn2tsff8v 10

28-04-2024 19:22

240428-x3cbnsfd2t 10

28-04-2024 19:18

240428-xz2gdseh66 10

28-04-2024 19:07

240428-xsyrxsfa5x 1

Analysis

  • max time kernel
    0s
  • max time network
    112s
  • platform
    ubuntu-18.04_amd64
  • resource
    ubuntu1804-amd64-20240226-en
  • resource tags

    arch:amd64arch:i386image:ubuntu1804-amd64-20240226-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system
  • submitted
    28-04-2024 19:22

General

  • Target

    k.elf

  • Size

    1.5MB

  • MD5

    cfb6d21ffe7c4279f761f2351c0810ee

  • SHA1

    ee827023780964574f28c6ba333d800b73eae5c4

  • SHA256

    95776f31cbcac08eb3f3e9235d07513a6d7a6bf9f1b7f3d400b2cf0afdb088a7

  • SHA512

    c24342fe718d9cd8be98741cb7962b39cdf887b855ac0d7d6c0bbdd346fffd3f1dd1bdb91728bd16efe61456792fcc70b17e6f98cc052e229d186f1d7a28a9b8

  • SSDEEP

    24576:t4mEitdoHarsfZqy5hEiefNvF6pVuQYGM:tdE2dxrUqy5ep5F6mQlM

Score
10/10

Malware Config

Extracted

Path

/tmp/readme.txt

Family

conti

Ransom Note
All of your files are currently encrypted by CONTI strain. If you don't know who we are - just "Google it." As you already know, all of your data has been encrypted by our software. It cannot be recovered by any means without contacting our team directly. DON'T TRY TO RECOVER your data by yourselves. Any attempt to recover your data (including the usage of the additional recovery software) can damage your files. However, if you want to try - we recommend choosing the data of the lowest value. DON'T TRY TO IGNORE us. We've downloaded a pack of your internal data and are ready to publish it on our news website if you do not respond. So it will be better for both sides if you contact us as soon as possible. DON'T TRY TO CONTACT feds or any recovery companies. We have our informants in these structures, so any of your complaints will be immediately directed to us. So if you will hire any recovery company for negotiations or send requests to the police/FBI/investigators, we will consider this as a hostile intent and initiate the publication of whole compromised data immediately. To prove that we REALLY CAN get your data back - we offer you to decrypt two random files completely free of charge. You can contact our team directly for further instructions through our website : TOR VERSION : (you should download and install TOR browser first https://torproject.org) http://contirec7nchr45rx6ympez5rjldibnqzh7lsa56lvjvaeywhvoj3wad.onion/ykCDUCsFcCYo8BNSsvH2TZTvCnEUM30XKoeCZiXUQEjPnzp1nee2ivFY0hAf7frb YOU SHOULD BE AWARE! We will speak only with an authorized person. It can be the CEO, top management, etc. In case you are not such a person - DON'T CONTACT US! Your decisions and action can result in serious harm to your company! Inform your supervisors and stay calm!
URLs

http://contirec7nchr45rx6ympez5rjldibnqzh7lsa56lvjvaeywhvoj3wad.onion/ykCDUCsFcCYo8BNSsvH2TZTvCnEUM30XKoeCZiXUQEjPnzp1nee2ivFY0hAf7frb

Signatures

  • Conti Ransomware

    Ransomware generally thought to be a successor to Ryuk.

  • Writes file to tmp directory 23 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/k.elf
    /tmp/k.elf sh ./k.elf --path /tmp
    1⤵
    • Writes file to tmp directory
    PID:1521

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /tmp/readme.txt

    Filesize

    1KB

    MD5

    f2ec65b6ccc5e28343ce62a48279027f

    SHA1

    7ef88d7845747810a522b73b48f85774cc3d5d0e

    SHA256

    a01e047b193671716125c6cf06171b0b0cac332631065ea5320fff4be0971582

    SHA512

    b48e8c82812e03afbc39f55f59e5110d181b107000c87491eb6adfebe19b7a3679dac6debb5fd0319afb53a12ed476dd4d5212aa5470e8b015ff1abdb3ce1b38

  • /tmp/result.txt

    Filesize

    33B

    MD5

    e7e930dbed22a8a67cfcd9c510268087

    SHA1

    1e19959cb6ac9c43da3c142c72fa71163f261095

    SHA256

    b61d766a605a6c97ee10e601e707996734cb6a538356aeaa237903c3040e8303

    SHA512

    c04c113344e21a79156bbd3cb86e74e584e5d154e5ce04f9fcad5184e0c2355dd7d6767b45bbb9fce720eed36cbcd36f4f9aa981e682a03f957c07a219dac931