Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
31-05-2024 12:29
Static task
static1
Behavioral task
behavioral1
Sample
e88553dda98dc3bc66070442ae39db097c81ee7bb0ae9898d3c4ab6b4542fccc.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e88553dda98dc3bc66070442ae39db097c81ee7bb0ae9898d3c4ab6b4542fccc.exe
Resource
win10v2004-20240508-en
General
-
Target
e88553dda98dc3bc66070442ae39db097c81ee7bb0ae9898d3c4ab6b4542fccc.exe
-
Size
2.4MB
-
MD5
f29f2e5c03c8e57ceac285cb19d40600
-
SHA1
a60830fcb1b1e1946a912656d8840fdba9ec9757
-
SHA256
e88553dda98dc3bc66070442ae39db097c81ee7bb0ae9898d3c4ab6b4542fccc
-
SHA512
d61aac5a76220a279252af54429de54e0857e3fb27ea0cac621d9f94a162103ff9d77371afe437bafc12bae292dcb5dd60ee2120befd05222d99bed27613e716
-
SSDEEP
49152:GSJ0MaLywg+H/FWUZ8CbjSNTMkTP70VTszxwGdSlvuhVbBRft7EfOWn3:nV6lroNIUD0RWxwHm1fW3
Malware Config
Extracted
blackcat
- Username:
KELLERSUPPLY\Administrator - Password:
d@gw00d
- Username:
KELLERSUPPLY\AdminRecovery - Password:
K3ller!$Supp1y
- Username:
.\Administrator - Password:
d@gw00d
- Username:
.\Administrator - Password:
K3ller!$Supp1y
-
enable_network_discovery
true
-
enable_self_propagation
true
-
enable_set_wallpaper
true
-
extension
sykffle
-
note_file_name
RECOVER-${EXTENSION}-FILES.txt
-
note_full_text
>> Introduction Important files on your system was ENCRYPTED and now they have have "${EXTENSION}" extension. In order to recover your files you need to follow instructions below. >> Sensitive Data Sensitive data on your system was DOWNLOADED and it will be PUBLISHED if you refuse to cooperate. Data includes: - Employees personal data, CVs, DL, SSN. - Complete network map including credentials for local and remote services. - Financial information including clients data, bills, budgets, annual reports, bank statements. - Complete datagrams/schemas/drawings for manufacturing in solidworks format - And more... Private preview is published here: http://zujgzbu5y64xbmvc42addp4lxkoosb4tslf5mehnh7pvqjpwxn5gokyd.onion/b21e1fb6-ff88-425b-8339-3523179a1e3e/886cf430a907bbe9a3fd38fb704d524dbd199c1b042ad6f65dc72ad78704e21 >> CAUTION DO NOT MODIFY FILES YOURSELF. DO NOT USE THIRD PARTY SOFTWARE TO RESTORE YOUR DATA. YOU MAY DAMAGE YOUR FILES, IT WILL RESULT IN PERMANENT DATA LOSS. YOUR DATA IS STRONGLY ENCRYPTED, YOU CAN NOT DECRYPT IT WITHOUT CIPHER KEY. >> Recovery procedure Follow these simple steps to get in touch and recover your data: 1) Download and install Tor Browser from: https://torproject.org/ 2) Navigate to: http://mu75ltv3lxd24dbyu6gtvmnwybecigs5auki7fces437xvvflzva2nqd.onion/?access-key=${ACCESS_KEY}
Signatures
-
BlackCat
A Rust-based ransomware sold as RaaS first seen in late 2021.