General

  • Target

    8639825230d5504fd8126ed55b2d7aeb72944ffe17e762801aab8d4f8f880160

  • Size

    296KB

  • Sample

    240921-zdb1qasekl

  • MD5

    258ed03a6e4d9012f8102c635a5e3dcd

  • SHA1

    a3bc2a30318f9bd2b51cb57e2022996e7f15c69e

  • SHA256

    8639825230d5504fd8126ed55b2d7aeb72944ffe17e762801aab8d4f8f880160

  • SHA512

    967414274cb8d8fdf0e4dd446332b37060d54a726ab77f4ec704a5afe12162e098183add4342d1710db1e1c3b74035a001cf4c2d7790a27bf6d8381c34a96889

  • SSDEEP

    3072:Kv4ZAWXDSxcoWn+v75ssiEcx7fWr5JNfb23y2O1Nm5dc:B1X7vwVspdOJND01

Malware Config

Extracted

Path

C:\ProgramData\Microsoft\OfficeSoftwareProtectionPlatform\Cache\2FAF28-Readme.txt

Family

netwalker

Ransom Note
Hi! Your files are encrypted by Netwalker. All encrypted files for this computer has extension: .2faf28 -- If for some reason you read this text before the encryption ended, this can be understood by the fact that the computer slows down, and your heart rate has increased due to the ability to turn it off, then we recommend that you move away from the computer and accept that you have been compromised. Rebooting/shutdown will cause you to lose files without the possibility of recovery. -- Our encryption algorithms are very strong and your files are very well protected, the only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypter program, you may damage them and then they will be impossible to recover. For us this is just business and to prove to you our seriousness, we will decrypt you one file for free. Just open our website, upload the encrypted file and get the decrypted file for free. -- Steps to get access on our website: 1.Download and install tor-browser: https://torproject.org/ 2.Open our website: rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion 3.Put your personal code in the input form: {code_2faf28: 0gcodg9II6luesrgeBVOAjE8dnxvUTjzr7idm+m6FrKRRhQa73 YwdoqUj5dig3bzoeWOHcVLQb4SIfnIEwBzOFhnYVeUaaZ241Zj Al6KTHAuECu2IBngwPmccSB1ZfvoKI6Z72swIveso29CSQn8yK VesCbv0AUNvOmr7mw9Wj5a97MEFA9xyb8I0fyy1YKnIvEl+8Gx Q7gY+0+Fw6JErysRrdC0DreRVIJFm5CPXdJP40jWCaZYvemfm7 nR008afyEi7x7BoosR5TqYzAiRr7Hfko0gkiYIxQ==}
URLs

http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion

Extracted

Path

C:\Program Files (x86)\Adobe\Acrobat Reader DC\C1DE0E-Readme.txt

Family

netwalker

Ransom Note
Hi! Your files are encrypted by Netwalker. All encrypted files for this computer has extension: .c1de0e -- If for some reason you read this text before the encryption ended, this can be understood by the fact that the computer slows down, and your heart rate has increased due to the ability to turn it off, then we recommend that you move away from the computer and accept that you have been compromised. Rebooting/shutdown will cause you to lose files without the possibility of recovery. -- Our encryption algorithms are very strong and your files are very well protected, the only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypter program, you may damage them and then they will be impossible to recover. For us this is just business and to prove to you our seriousness, we will decrypt you one file for free. Just open our website, upload the encrypted file and get the decrypted file for free. -- Steps to get access on our website: 1.Download and install tor-browser: https://torproject.org/ 2.Open our website: rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion 3.Put your personal code in the input form: {code_c1de0e: Wpl09i49IjkDLXkWTiccIfn8SRYWDe6wYdCETzGSxYXxPpO/wb AHrRNGNddLthR1fiW3wxSugDJIlmuMaTmSxFxQy5klfpwv41Zj AmdLD7L/MJGsVt3UlVixbXpyZz9vPssGZ2mA3P4CEN3G8/q/Kb l8XzlzLaIv8u8mjDt+k4orVlP5xFYos2OAjUd/y6dOIEZ1SfRA k8ZocZH7R2F01X3mAvghwzqIp3AKxgv+8idzTN1jQr6HxVt6fi USn5UIIB8Ni9mI4H5D5428XSPvi99rzeJaysLxhw==}
URLs

http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion

Targets

    • Target

      8639825230d5504fd8126ed55b2d7aeb72944ffe17e762801aab8d4f8f880160

    • Size

      296KB

    • MD5

      258ed03a6e4d9012f8102c635a5e3dcd

    • SHA1

      a3bc2a30318f9bd2b51cb57e2022996e7f15c69e

    • SHA256

      8639825230d5504fd8126ed55b2d7aeb72944ffe17e762801aab8d4f8f880160

    • SHA512

      967414274cb8d8fdf0e4dd446332b37060d54a726ab77f4ec704a5afe12162e098183add4342d1710db1e1c3b74035a001cf4c2d7790a27bf6d8381c34a96889

    • SSDEEP

      3072:Kv4ZAWXDSxcoWn+v75ssiEcx7fWr5JNfb23y2O1Nm5dc:B1X7vwVspdOJND01

    • Detected Netwalker Ransomware

      Detected unpacked Netwalker executable.

    • Netwalker Ransomware

      Ransomware family with multiple versions. Also known as MailTo.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (7383) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks