Resubmissions

21-09-2024 21:15

240921-z37hxsvamj 3

21-09-2024 21:08

240921-zy79natgkl 10

General

  • Target

    RNSM00476.7z

  • Size

    53.6MB

  • Sample

    240921-zy79natgkl

  • MD5

    3453b51a79f4053a6642b7ee5ad12413

  • SHA1

    854615633e791d6b0ffcbdbffa00987df74f9f2a

  • SHA256

    03a15123b54b8e5252af565dbc10e7c1d732ab8a92b905f6811e621680d7ff2c

  • SHA512

    10ad20ff82d71848d8e53e26f77b488744d11e97a913501fe5411a94dea7718f0d54720139c2ddb0091d57db2823e522304e09daddf7bb7510f8935947953879

  • SSDEEP

    1572864:5VYlmb1XMQnjyzo5ZMTxV85tW1gR1MXJVAbW:L1c+3YTA5EgM5VAbW

Malware Config

Extracted

Family

gandcrab

C2

http://gdcbghvjyqy7jclk.onion.top/

Extracted

Path

C:\Users\Admin\Desktop\00476\read_it.txt

Family

chaos

Ransom Note
----> Chaos is multi language ransomware. Translate your note to any language <---- All of your files have been encrypted Your computer was infected with a ransomware virus. Your files have been encrypted and you won't be able to decrypt them without our help.What can I do to get my files back?You can buy our special decryption software, this software will allow you to recover all of your data and remove the ransomware from your computer.The price for the software is $1,500. Payment can be made in Bitcoin only. How do I pay, where do I get Bitcoin? Purchasing Bitcoin varies from country to country, you are best advised to do a quick google search yourself to find out how to buy Bitcoin. Many of our customers have reported these sites to be fast and reliable: Coinmama - hxxps://www.coinmama.com Bitpandva - hxxps://www.bitpanda.com Payment informationAmount: 0.1473766 BTC Bitcoin Address: bc1qlnzcep4l4ac0ttdrq7awxev9ehu465f2vpt9x0

Extracted

Path

F:\$RECYCLE.BIN\README.txt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA4096 More information about the encryption keys using RSA4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA4096 Key , both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So , there are two ways you can choose: wait for a _miracle_ and get _your_ PRICE DOUBLED! Or start obtaining *BITCOIN NOW! , and restore _YOUR_ _DATA_ easy way If You have really valuable _DATA_, you better _NOT_ _WASTE_ _YOUR_ _TIME_, because there is _NO_ other way to get your files, except make a _PAYMENT_ Your personal ID: 74F3607E4A638F47C51F018334090501�������� For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1 - http://xijymvzq4zkyubfe.onion.to 2 - http://xijymvzq4zkyubfe.onion.city If for some reasons the addresses are not availablweropie, follow these steps: 1 - Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2 - Video instruction: https://www.youtube.com/watch?v=NQrUZdsw2hA 3 - After a successful installation, run the browser 4 - Type in the address bar: http://xijymvzq4zkyubfe.onion 5 - Follow the instructions on the site �
URLs

http://xijymvzq4zkyubfe.onion.to

http://xijymvzq4zkyubfe.onion.city

http://xijymvzq4zkyubfe.onion

Targets

    • Target

      RNSM00476.7z

    • Size

      53.6MB

    • MD5

      3453b51a79f4053a6642b7ee5ad12413

    • SHA1

      854615633e791d6b0ffcbdbffa00987df74f9f2a

    • SHA256

      03a15123b54b8e5252af565dbc10e7c1d732ab8a92b905f6811e621680d7ff2c

    • SHA512

      10ad20ff82d71848d8e53e26f77b488744d11e97a913501fe5411a94dea7718f0d54720139c2ddb0091d57db2823e522304e09daddf7bb7510f8935947953879

    • SSDEEP

      1572864:5VYlmb1XMQnjyzo5ZMTxV85tW1gR1MXJVAbW:L1c+3YTA5EgM5VAbW

    • Avoslocker Ransomware

      Avoslocker is a relatively new ransomware, that was observed in late June and early July, 2021.

    • Chaos

      Ransomware family first seen in June 2021.

    • Chaos Ransomware

    • GandCrab payload

    • Gandcrab

      Gandcrab is a Trojan horse that encrypts files on a computer.

    • Renames multiple (176) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Uses Tor communications

      Malware can proxy its traffic through Tor for more anonymity.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks