General

  • Target

    64248d0299618de7464d665ecec906c2_JaffaCakes118

  • Size

    908KB

  • Sample

    240521-v2bmmsda5s

  • MD5

    64248d0299618de7464d665ecec906c2

  • SHA1

    163e2607670ee5008ba4d371f0832cbda0743943

  • SHA256

    991a843a7f99ffd47fbdd9aa486abcfe8c97540248542b8f1fa878760f70a000

  • SHA512

    d2eaf1e04177471ce363a5871dd7586f5da6378a1b99d59fa746b9df618813e726e2f5c7c88d1c6abe219070b2bdcba5ffb78065b8fd381af60eb93ffc15c59a

  • SSDEEP

    6144:y/WXp13E8LFVy9KrE0zxiRgvLK9HvsG8todmCn4q/FVv4fTYnGu9TKC8+3Kk:y2rbVvdtqzZdKC8+3Kk

Malware Config

Extracted

Path

C:\Program Files (x86)\MSBuild\B1C597-Readme.txt

Family

netwalker

Ransom Note
Hi! Your files are encrypted. All encrypted files for this computer has extension: .b1c597 -- If for some reason you read this text before the encryption ended, this can be understood by the fact that the computer slows down, and your heart rate has increased due to the ability to turn it off, then we recommend that you move away from the computer and accept that you have been compromised. Rebooting/shutdown will cause you to lose files without the possibility of recovery. -- Our encryption algorithms are very strong and your files are very well protected, the only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypter program, you may damage them and then they will be impossible to recover. For us this is just business and to prove to you our seriousness, we will decrypt you one file for free. Just open our website, upload the encrypted file and get the decrypted file for free. Additionally, your data may have been stolen and if you do not cooperate with us, it will become publicly available on our blog. -- Steps to get access on our website: 1.Download and install tor-browser: https://torproject.org/ 2.Open our website: pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion If the website is not available, open another one: rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion 3.Put your personal code in the input form: {code_b1c597: dp/6NPp6bKSGtTXKIC6dddPMBVdoir8ICl7qI/XP+2+AvTYJ6c IYUjTUXZIJQLd5T+Slb9oZBiLtTfu3xLGFPPrSZQ8kn/VuDDvF yHLxi0hQIZD4K27LvpEuBYUusEzZJMkztciCqtdVw6LWHAFocN HYIbUJ3nUqzPpKl9DRg/4wEo+WYA6E/t/TDi1agSYLqud7nxY1 MQggBYYCWTFLRQXnJEaR+OFQIk5iFV6JOBR92/622HQOYcuyc7 JOJZzmGmfKHwaCQ6xeD9ZnZutx/6oXgtdg2p86pA==}
URLs

http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion

http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion

Extracted

Path

C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\605EAE-Readme.txt

Family

netwalker

Ransom Note
Hi! Your files are encrypted. All encrypted files for this computer has extension: .605eae -- If for some reason you read this text before the encryption ended, this can be understood by the fact that the computer slows down, and your heart rate has increased due to the ability to turn it off, then we recommend that you move away from the computer and accept that you have been compromised. Rebooting/shutdown will cause you to lose files without the possibility of recovery. -- Our encryption algorithms are very strong and your files are very well protected, the only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypter program, you may damage them and then they will be impossible to recover. For us this is just business and to prove to you our seriousness, we will decrypt you one file for free. Just open our website, upload the encrypted file and get the decrypted file for free. Additionally, your data may have been stolen and if you do not cooperate with us, it will become publicly available on our blog. -- Steps to get access on our website: 1.Download and install tor-browser: https://torproject.org/ 2.Open our website: pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion If the website is not available, open another one: rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion 3.Put your personal code in the input form: {code_605eae: Tsc50zJtNDGYA7vOSXOsn0PqVG4HG/ZBWlyuKF1mJsYzu16FTE ZgZSgygH3//IhSInuu14z8Z2udkHYNQLKj2w86Id+rBV9YDDvF yG/hTNo45HpXoekiz+l8HzDmmzdQkIdSn5kZSFKZ9+ZwKEqPwr hKzrDZl/eIxE5Ghnw/qvPvVblvwaS2TCY7rjgtcRgAF7MOLFQM AMaXLbPzH49PiaUTV4iRmWN86fgr6d39H/434dbj+nTmRELJ0m L3+UTr9neTFP72tmvC6oC7Qdp6Sf9whf0j0edSow==}
URLs

http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion

http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion

Targets

    • Target

      64248d0299618de7464d665ecec906c2_JaffaCakes118

    • Size

      908KB

    • MD5

      64248d0299618de7464d665ecec906c2

    • SHA1

      163e2607670ee5008ba4d371f0832cbda0743943

    • SHA256

      991a843a7f99ffd47fbdd9aa486abcfe8c97540248542b8f1fa878760f70a000

    • SHA512

      d2eaf1e04177471ce363a5871dd7586f5da6378a1b99d59fa746b9df618813e726e2f5c7c88d1c6abe219070b2bdcba5ffb78065b8fd381af60eb93ffc15c59a

    • SSDEEP

      6144:y/WXp13E8LFVy9KrE0zxiRgvLK9HvsG8todmCn4q/FVv4fTYnGu9TKC8+3Kk:y2rbVvdtqzZdKC8+3Kk

    • Netwalker Ransomware

      Ransomware family with multiple versions. Also known as MailTo.

    • Renames multiple (7440) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

MITRE ATT&CK Enterprise v15

Tasks