Analysis

  • max time kernel
    93s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-05-2024 13:35

General

  • Target

    e5f28764ba3e0f60f666d468666a3aa108aa05e04cbabd8182a2578c1361f432.exe

  • Size

    3.1MB

  • MD5

    d5785fd5fc955ef444d44ed87c56d90e

  • SHA1

    69222185bc44dd20939c4cad466a5e992f25cafb

  • SHA256

    e5f28764ba3e0f60f666d468666a3aa108aa05e04cbabd8182a2578c1361f432

  • SHA512

    c79991215cd8c271b1607b417873269ae61d4119de3702f1c52bc4b71f9d5cea945ba49306a166a7f14aefbcdcb9ceebb38b84c05f3a50a4cfae3cf673e75157

  • SSDEEP

    98304:wP0tuavdUDQUtnXS/9+LiVBwmC8ifJnzLPOZMj5Z3pFf:buavdH4ni/9/B1IvPHBpF

Score
10/10

Malware Config

Extracted

Family

blackcat

Attributes
  • enable_network_discovery

    true

  • enable_self_propagation

    true

  • enable_set_wallpaper

    true

  • extension

    7954i9r

  • note_file_name

    RECOVER-${EXTENSION}-FILES.txt

  • note_full_text

    >> Introduction Important files on your system was ENCRYPTED and now they have have "${EXTENSION}" extension. In order to recover your files you need to follow instructions below. >> Sensitive Data Sensitive data on your system was DOWNLOADED and it will be PUBLISHED if you refuse to cooperate. Data includes: - Employees personal data, CVs, DL, SSN. - Complete network map including credentials for local and remote services. - Financial information including clients data, bills, budgets, annual reports, bank statements. - Complete datagrams/schemas/drawings for manufacturing in solidworks format - And more... Private preview is published here: http://alphvmmm27o3abo3r2mlmjrpdmzle3rykajqc5xsj7j7ejksbpsa36ad.onion/336eb50d-ebf8-436b-937d-ec075de46e7f/419ef3f950d9f346cf86db56db453539dcd51567ea871728e78dbc9918c7efeb >> CAUTION DO NOT MODIFY FILES YOURSELF. DO NOT USE THIRD PARTY SOFTWARE TO RESTORE YOUR DATA. YOU MAY DAMAGE YOUR FILES, IT WILL RESULT IN PERMANENT DATA LOSS. YOUR DATA IS STRONGLY ENCRYPTED, YOU CAN NOT DECRYPT IT WITHOUT CIPHER KEY. >> Recovery procedure Follow these simple steps to get in touch and recover your data: 1) Download and install Tor Browser from: https://torproject.org/ 2) Navigate to: http://sty5r4hhb5oihbq2mwevrofdiqbgesi66rvxr5sr573xgvtuvr4cs5yd.onion/?access-key=${ACCESS_KEY}

rsa_pubkey.plain

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\e5f28764ba3e0f60f666d468666a3aa108aa05e04cbabd8182a2578c1361f432.exe
    "C:\Users\Admin\AppData\Local\Temp\e5f28764ba3e0f60f666d468666a3aa108aa05e04cbabd8182a2578c1361f432.exe"
    1⤵
      PID:5008

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/5008-1-0x0000000000400000-0x000000000070F000-memory.dmp

      Filesize

      3.1MB

    • memory/5008-3-0x0000000000400000-0x000000000070F000-memory.dmp

      Filesize

      3.1MB

    • memory/5008-6-0x00000000001D0000-0x00000000001D2000-memory.dmp

      Filesize

      8KB

    • memory/5008-10-0x0000000000400000-0x000000000070F000-memory.dmp

      Filesize

      3.1MB

    • memory/5008-9-0x0000000000401000-0x0000000000602000-memory.dmp

      Filesize

      2.0MB

    • memory/5008-8-0x0000000000190000-0x00000000001CC000-memory.dmp

      Filesize

      240KB

    • memory/5008-4-0x0000000000401000-0x0000000000602000-memory.dmp

      Filesize

      2.0MB

    • memory/5008-2-0x0000000000400000-0x000000000070F000-memory.dmp

      Filesize

      3.1MB

    • memory/5008-5-0x0000000000400000-0x000000000070F000-memory.dmp

      Filesize

      3.1MB

    • memory/5008-0-0x0000000000400000-0x000000000070F000-memory.dmp

      Filesize

      3.1MB