General

  • Target

    0a4d13cc853167eb5dba107afbd3ecff019bf46becb78e20241e3846b3a1bb69

  • Size

    1.6MB

  • MD5

    0b4dbfd51592a774163dd751d9f0c597

  • SHA1

    921d2ab37eb50569a8b35b3a25dbb53e5168087f

  • SHA256

    0a4d13cc853167eb5dba107afbd3ecff019bf46becb78e20241e3846b3a1bb69

  • SHA512

    6ff3ff6cdae7fc7226142be716a562f829a967feb3f04f1d4eb46f2fe570232276a77e31ab3a77f178056fcc939e6ad763c689799052d98e93acc6eb6ad7bda1

  • SSDEEP

    49152:j08MiLcTg6fd9hd+mgUsAvqTxQ46/oOuVdaDoZ:IiL4g6fdnEZUSS4gPuVdSw

Score
10/10

Malware Config

Extracted

Family

blackcat

Credentials
  • Username:
    CREDITONE\Administrator
  • Password:
    K3ny@2009
  • Username:
    CREDITONE\bexec
  • Password:
    CloneD1sk4Song$%
  • Username:
    CREDITONE\KLarry
  • Password:
    Kl..2021
  • Username:
    CREDITONE\BKuhl
  • Password:
    Gromit2021!
  • Username:
    CREDITONE\rlopez
  • Password:
    Victoria7856!
  • Username:
    CREDITONE\EJaramilla
  • Password:
    1LoveVeros4
  • Username:
    .\Administrator
  • Password:
    $fiji12$
Attributes
  • enable_network_discovery

    true

  • enable_self_propagation

    true

  • enable_set_wallpaper

    true

  • extension

    7954i9r

  • note_file_name

    RECOVER-${EXTENSION}-FILES.txt

  • note_full_text

    >> Introduction Important files on your system was ENCRYPTED and now they have have "${EXTENSION}" extension. In order to recover your files you need to follow instructions below. >> Sensitive Data Sensitive data on your system was DOWNLOADED and it will be PUBLISHED if you refuse to cooperate. Data includes: - Employees personal data, CVs, DL, SSN. - Complete network map including credentials for local and remote services. - Financial information including clients data, bills, budgets, annual reports, bank statements. - Complete datagrams/schemas/drawings for manufacturing in solidworks format - And more... Private preview is published here: http://alphvmmm27o3abo3r2mlmjrpdmzle3rykajqc5xsj7j7ejksbpsa36ad.onion/336eb50d-ebf8-436b-937d-ec075de46e7f/419ef3f950d9f346cf86db56db453539dcd51567ea871728e78dbc9918c7efeb >> CAUTION DO NOT MODIFY FILES YOURSELF. DO NOT USE THIRD PARTY SOFTWARE TO RESTORE YOUR DATA. YOU MAY DAMAGE YOUR FILES, IT WILL RESULT IN PERMANENT DATA LOSS. YOUR DATA IS STRONGLY ENCRYPTED, YOU CAN NOT DECRYPT IT WITHOUT CIPHER KEY. >> Recovery procedure Follow these simple steps to get in touch and recover your data: 1) Download and install Tor Browser from: https://torproject.org/ 2) Navigate to: http://sty5r4hhb5oihbq2mwevrofdiqbgesi66rvxr5sr573xgvtuvr4cs5yd.onion/?access-key=${ACCESS_KEY}

rsa_pubkey.plain

Signatures

  • Blackcat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 0a4d13cc853167eb5dba107afbd3ecff019bf46becb78e20241e3846b3a1bb69
    .zip

    Password: infected

  • 731adcf2d7fb61a8335e23dbe.exe
    .exe windows:4 windows x86 arch:x86

    55c1bce75ad836c886b7fb6bca398063


    Headers

    Imports

    Sections