Resubmissions

26-06-2024 20:47

240626-zk9wbswapl 10

26-06-2024 20:32

240626-zbgs7avdpj 10

General

  • Target

    0d148218983f96167795e70053b0960d5a501a30b3c45e626e9228af49af2248.zip

  • Size

    4.6MB

  • Sample

    240626-zbgs7avdpj

  • MD5

    1a812603c9d6bc0ac351e94673b4ab3d

  • SHA1

    850141c034f57e4f5f6a606c01f9a25272000c6c

  • SHA256

    17c3078f12b4e4458e00b50eec5a68b3744845e301232a6a354c81ed6df1b2aa

  • SHA512

    66da7d621f2bab6044543e01c90a7ce8ba01241ce0fa14da4d4cbe721c19d7507152742b10ccaa8f099920bc3ce5dd3b63d8ffcec353cc09b03dbbaaf3610986

  • SSDEEP

    98304:0B1eLHh1oSrrTBQ0h7i0qtdthczdRhfPFi8fBLGeOnUYDeloVsUhn6Yb4nf8Z:03eLHC0gRXcHpBuU+TV9uC

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\ÊÀÊ ÐÀÑØÈÔÐÎÂÀÒÜ ÔÀÉËÛ.txt

Ransom Note
All your files have been encrypted due to a security issue with your computer. If you want to restore them, email us Telegram @root_backdoor_synaptics_V,@DosX_Plus,@Cinoshi_Adm,@ac3ss0r Specify this identifier in the header of your message - XFQCF$GWE@ If there is no response within 24 hours, write to us in this telegram account:@DosX_Plus You have to pay to decrypt the malware. The amount depends on how quickly you write to us. After sending, we will send you a decryption tool that will decrypt all your files. LiteCoin: MCwRK1Z7K4GYHt9ZrbTR2SMCEqzqQaTbRF USDT (ERC-20): 0x334F093c9De6552AF4cC0B252dA82aC77FeB467D Free decryption as a guarantee Before sending, you can send us up to 5 files for free decryption. The total size of the files should be less than 10 MB (unarchived), and the files should not contain valuable information. (databases, backups, large Excel sheets, etc.) Buy a buyback https://kay-software.ru
URLs

https://kay-software.ru

Targets

    • Target

      0d148218983f96167795e70053b0960d5a501a30b3c45e626e9228af49af2248.exe

    • Size

      4.7MB

    • MD5

      1df3028b6a1e41a393bb542df2274145

    • SHA1

      332899d8f3e304a4447bc7256bbc127c34303291

    • SHA256

      0d148218983f96167795e70053b0960d5a501a30b3c45e626e9228af49af2248

    • SHA512

      a73115bb838839a1a0a2e4033265422e37eba53cbd295277f5139a1a223bbd2cc3381355069269943f82f834cb6eeec36c5b41c7ab98fa89b9fce03903003308

    • SSDEEP

      98304:jbxXg98fQNhyC+Dt1RA9hgpG3qhWXLpSwlzf9UT7fJ/sBo4:jp1fQNhN0EgpTWXLpS8ZGx/sBo4

    • Detected Xorist Ransomware

    • Xorist Ransomware

      Xorist is a ransomware first seen in 2020.

    • Renames multiple (5486) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Drops file in Drivers directory

    • Manipulates Digital Signatures

      Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks