General

  • Target

    main.exe

  • Size

    40.5MB

  • Sample

    240620-w2tnws1fjc

  • MD5

    b27417cda7bf655761b8a89e609c83d1

  • SHA1

    e979d32d7b4469cee93793a008decacfe00a318f

  • SHA256

    c25677b4192ef0a958d8a415c80ef26bcb9f7a9aa602913827b129035073b87a

  • SHA512

    a8fe6374381c9de66dc13afb419feaf705535cce78d7607bdac647649105154cea2d1f232dad3507b62f8cc9a36f5580f6002e51b9caff6201252195c351d67a

  • SSDEEP

    786432:S+gX4BMdhwzTQXR5FbPp6FcSS5U/LT2KzVyPVLedNYQFbaF5FJ:oXGMK4XR3bLSCU/+6yPlINzbaFz

Score
10/10

Malware Config

Extracted

Path

C:\vcredist2012_x64_0_vcRuntimeMinimum_x64.log

Ransom Note
************************************************** RANSOMWARE NOTICE ************************************************** ATTENTION! Your files have been encrypted by a professional cybercriminal group specializing in data encryption and ransom demands. We have control over your most valuable information, and you will not be able to access it without our decryption key. To regain access to your files, follow these instructions precisely: 1. You must acquire Bitcoins equivalent to $$$$ USD. 2. Transfer the Bitcoins to the following wallet address: [Bitcoin address]. 3. Once the payment is completed, visit our secure Tor website using the Tor Browser at [Tor website URL]. 4. Enter your unique transaction ID to verify payment and receive your decryption tool. You have [time period] to make the payment. Failure to comply within this time will result in the permanent deletion of your decryption key, rendering your files irrecoverable. ************************************************** IMPORTANT: - Attempts to recover files using third-party software may lead to permanent data loss. - Do not contact law enforcement or cybersecurity experts, as this will result in immediate deletion of your decryption key. ************************************************** YOUR UNIQUE ID FOR PAYMENT: [unique ID] Time is running out. Act quickly to secure your files and prevent permanent loss. Remember, if you dare to break these important rules, we will leak all of your data without hesitation. ************************************************** *******************************

Targets

    • Target

      main.exe

    • Size

      40.5MB

    • MD5

      b27417cda7bf655761b8a89e609c83d1

    • SHA1

      e979d32d7b4469cee93793a008decacfe00a318f

    • SHA256

      c25677b4192ef0a958d8a415c80ef26bcb9f7a9aa602913827b129035073b87a

    • SHA512

      a8fe6374381c9de66dc13afb419feaf705535cce78d7607bdac647649105154cea2d1f232dad3507b62f8cc9a36f5580f6002e51b9caff6201252195c351d67a

    • SSDEEP

      786432:S+gX4BMdhwzTQXR5FbPp6FcSS5U/LT2KzVyPVLedNYQFbaF5FJ:oXGMK4XR3bLSCU/+6yPlINzbaFz

    Score
    10/10
    • Loads dropped DLL

    • Drops desktop.ini file(s)

MITRE ATT&CK Matrix

Tasks