General

  • Target

    18045617893.zip

  • Size

    787KB

  • Sample

    240704-mxxejswcqn

  • MD5

    ab044f6b81a5097dba621f5de0eb0393

  • SHA1

    ef8f291014d9b3c95ff347c2433ffa790b591214

  • SHA256

    450238a9a61c45e3b6aca804f77388f402165c0418177b0d69ae6185689fecb0

  • SHA512

    7348a0ac4557cb9893c943f06404b1ae78809ce1f5b4b45de5483716653fadf8e01f728fd19f16dfb4a390f571a0e6179b8e8e86a72b87de9e3af3ee1ed41704

  • SSDEEP

    24576:t33RrKND0iPCKW0IkbZZJa6vJO3AL/IkAbhX:tRcAiKoDrJTvJOwL/Id

Score
10/10

Malware Config

Extracted

Family

agenda

Attributes
  • company_id

    MmXReVIxLV

  • note

    -- Qilin Your network/system was encrypted. Encrypted files have new extension. -- Compromising and sensitive data We have downloaded compromising and sensitive data from you system/network If you refuse to communicate with us and we do not come to an agreementyour data will be published. Data includes: - Employees personal dataCVsDLSSN. - Complete network map including credentials for local and remote services. - Financial information including clients databillsbudgetsannual reportsbank statements. - Complete datagrams/schemas/drawings for manufacturing in solidworks format - And more... -- Warning 1) If you modify files - our decrypt software won't able to recover data 2) If you use third party software - you can damage/modify files (see item 1) 3) You need cipher key / our decrypt software to restore you files. 4) The police or authorities will not be able to help you get the cipher key. We encourage you to consider your decisions. -- Recovery 1) Download tor browser: https://www.torproject.org/download/ 2) Go to domain 3) Enter credentials -- Credentials Extension: MmXReVIxLV Domain: ueegj65kwr3v3sjhli73gjtmfnh2uqlte3vyg2kkyqq7cja2yx2ptaad.onion login: 6f031ccd-526a-4806-82a8-2e7d926243d4 password:

rsa_pubkey.plain

Targets

    • Target

      82903870f130bf6d3e7cd43297cc0fc788dc22cc28475cd07be162547f1a5385

    • Size

      1.6MB

    • MD5

      f6cf6f7882e162506eade5c67535ddca

    • SHA1

      326d7cde4f8bca09cf3611c82aa2295d48d74adb

    • SHA256

      82903870f130bf6d3e7cd43297cc0fc788dc22cc28475cd07be162547f1a5385

    • SHA512

      59997451fa77b43a6e4b60dd7a539b5a1b9c4d3f369d3403b5a0bb6154e788eebff2b211d13c8883f9b6aaba4b994bd9bb9eeeae798dbd435676ef9aeb008739

    • SSDEEP

      24576:0Bz37bSK2rgyik2VZGiOYnSadiUm6M551SaJkqFYUe3xHj96khCkyITnoXlIXvX/:0x6Rvik2VUKnzhQ4QkNXUy

    Score
    10/10
    • Agenda Ransomware

      A ransomware with multiple variants written in Golang and Rust first seen in August 2022.

MITRE ATT&CK Matrix

Tasks