General

  • Target

    VirusShare_4affa384ff6ab351df42fc3a02716670

  • Size

    364KB

  • Sample

    240610-ngb94sgg8s

  • MD5

    4affa384ff6ab351df42fc3a02716670

  • SHA1

    7bebae1ad50fd27c3df625dc3995256f7d8bb8c2

  • SHA256

    4f1e783f68071d95e0b07e1f8b80ed49d0d94a089ae96016b197f846350cfe66

  • SHA512

    802616cac860ed2facd74387475e45ecd5a9e00fb106db801cd0168659fcecb9bb0ca6afb4cfeeca592d24d20c07add685e9a65c3178c839d37850a324906070

  • SSDEEP

    6144:rHDYm7R++Qhm/FxsB+lIB+0ODLawCi308Ki7B4iTK24D1sr:rHr2mwB+g03S5idVK24Zsr

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\+REcovER+aujdl+.txt

Ransom Note
{}_~_~+ -$.-_+$|~~_|| =|_$.**+-~| $+|=*.-=| !!! IMPORTANT INFORMATION !!!! All of your files are encrypted with RSA-4096. More information about the RSA algorythm can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) Decrypting of your files is only possible with the private key and decrypt program, which is on our secret server. To receive your private key follow one of the links: 1. http://88fga.ketteaero.com/6868E592FC8C7B1F 2. http://2bdfb.spinakrosa.at/6868E592FC8C7B1F 3. http://uj5nj.onanwhit.com/6868E592FC8C7B1F If all of the addresses are not available, follow these steps: 1. Download and install Tor Browser: https://www.torproject.org/download/download-easy.html 2. After a successful installation, run the browser and wait for initialization. 3. Type in the address bar: k7tlx3ghr3m4n2tu.onion/6868E592FC8C7B1F 4. Follow the instructions on the site. !!! Your personal identification ID: 6868E592FC8C7B1F !!! )(*=~_$~+$==-$*~=$$ __$-=-+*
URLs

http://88fga.ketteaero.com/6868E592FC8C7B1F

http://2bdfb.spinakrosa.at/6868E592FC8C7B1F

http://uj5nj.onanwhit.com/6868E592FC8C7B1F

http://k7tlx3ghr3m4n2tu.onion/6868E592FC8C7B1F

Extracted

Path

C:\Program Files\7-Zip\Lang\+REcovER+iivys+.txt

Ransom Note
{}_~_~+ -$.-_+$|~~_|| =|_$.**+-~| $+|=*.-=| !!! IMPORTANT INFORMATION !!!! All of your files are encrypted with RSA-4096. More information about the RSA algorythm can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) Decrypting of your files is only possible with the private key and decrypt program, which is on our secret server. To receive your private key follow one of the links: 1. http://88fga.ketteaero.com/F126583B6F187C94 2. http://2bdfb.spinakrosa.at/F126583B6F187C94 3. http://uj5nj.onanwhit.com/F126583B6F187C94 If all of the addresses are not available, follow these steps: 1. Download and install Tor Browser: https://www.torproject.org/download/download-easy.html 2. After a successful installation, run the browser and wait for initialization. 3. Type in the address bar: k7tlx3ghr3m4n2tu.onion/F126583B6F187C94 4. Follow the instructions on the site. !!! Your personal identification ID: F126583B6F187C94 !!! )(*=~_$~+$==-$*~=$$ __$-=-+*
URLs

http://88fga.ketteaero.com/F126583B6F187C94

http://2bdfb.spinakrosa.at/F126583B6F187C94

http://uj5nj.onanwhit.com/F126583B6F187C94

http://k7tlx3ghr3m4n2tu.onion/F126583B6F187C94

Targets

    • Target

      VirusShare_4affa384ff6ab351df42fc3a02716670

    • Size

      364KB

    • MD5

      4affa384ff6ab351df42fc3a02716670

    • SHA1

      7bebae1ad50fd27c3df625dc3995256f7d8bb8c2

    • SHA256

      4f1e783f68071d95e0b07e1f8b80ed49d0d94a089ae96016b197f846350cfe66

    • SHA512

      802616cac860ed2facd74387475e45ecd5a9e00fb106db801cd0168659fcecb9bb0ca6afb4cfeeca592d24d20c07add685e9a65c3178c839d37850a324906070

    • SSDEEP

      6144:rHDYm7R++Qhm/FxsB+lIB+0ODLawCi308Ki7B4iTK24D1sr:rHr2mwB+g03S5idVK24Zsr

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks