Resubmissions

07-10-2024 01:42

241007-b416jaxhmj 10

25-06-2024 21:17

240625-z45eysweqq 10

General

  • Target

    9543f71d7c4e394223c9d41ccef71541e1f1eb0cc76e8fa0f632b8365069af64.exe

  • Size

    146KB

  • Sample

    241007-b416jaxhmj

  • MD5

    95eb004d05b5560426f75126bdd77649

  • SHA1

    01b8d9eee21a269a02d0e8662a3ce2f9384d9169

  • SHA256

    9543f71d7c4e394223c9d41ccef71541e1f1eb0cc76e8fa0f632b8365069af64

  • SHA512

    45e17b6bac30e0ce0da8a76bd4e8ffce7aa1cb31056d57d0134e254753e53cefe17765a8aa3e5a9e657c50e78466e98e750631660b2c7ea8975fc77aa87b7eba

  • SSDEEP

    3072:sdjFOoTVq4m0zRilymyU3pQuz1T5SKiVi6n:4M2ZmEoL3Cu6KI

Malware Config

Extracted

Path

C:\Program Files\7-Zip\!!readme!!!.txt

Family

underground

Ransom Note
The Underground team welcomes you! We would like to inform that your network has been tested by us for vulnerabilities. Poor network security could cause your data to be lost forever. Your files are currently encrypted, they can be restored to their original state with a decryptor key that only we have. The key is in a single copy on our server. Attempting to recover data by your own efforts may result in data loss. It is important not to change their current state. Each file additionally has a unique cipher, which you can restore only with our help. We also examined your infrastructure and downloaded the most sensitive data. The list of hosts from which the information was downloaded: - 172.16.10.77 (NBA230.tpa.local) - 172.16.10.51 (SBAFS02.TPA.LOCAL) - 172.16.10.75 (NBA191.tpa.local) - 172.16.10.85 (NBA235.tpa.local) - 172.16.10.87 (NBA254.tpa.local) - 10.10.10.30 Synology (access via OpenVPN 46.29.3.77:1194) ---------------------------------- -email communications with clients that contain confidential agreements -accounting and tax reports for each client -audit documents -companys and clients financial documents -clients passports/ID's and private information -documents contain privileged and confidential information -password-protected documents from a bank -payroll data -company financial and performance data -employees personal information (Tc Identification Numbers) The total amount of downloaded information more than 200 Gb If you do not contact us within 3 days, or we cannot reach an agreement, all data will be published on a site that no one can block. Confidential data can be helpful for your competitors, enemies and darknet market hackers from over the world. The consequences will be unpredictable and the process cannot be stopped. Information about data leaks is bound to get into the media. Your company's reputation will be damaged. We value and respect every business, including yours. Therefore, we suggest you avoid further negative consequences and return to your work as soon as possible. We guarantee a fair and confidential deal in the shortest possible time. You will not only receive a decryptor, but also a description of your network vulnerabilities and information security recommendations. If necessary, you will be provided with qualified data recovery assistance. You can trust us! Reputation is important to everyone. As a proof of our statements, we are ready to restore some files for free and demonstrate how our product works. Best regards, Underground team ! Contacts for communication via chat: login to your account (Tor Browser) http://undgrddapc4reaunnrdrmnagvdelqfvmgycuvilgwb5uxm25sxawaoqd.onion/ your login: TPA your password: 7knCN#zQo@zuDZi your ID: dc6cb895e1681c716fcbbea57a8417a2
URLs

http://undgrddapc4reaunnrdrmnagvdelqfvmgycuvilgwb5uxm25sxawaoqd.onion/

Targets

    • Target

      9543f71d7c4e394223c9d41ccef71541e1f1eb0cc76e8fa0f632b8365069af64.exe

    • Size

      146KB

    • MD5

      95eb004d05b5560426f75126bdd77649

    • SHA1

      01b8d9eee21a269a02d0e8662a3ce2f9384d9169

    • SHA256

      9543f71d7c4e394223c9d41ccef71541e1f1eb0cc76e8fa0f632b8365069af64

    • SHA512

      45e17b6bac30e0ce0da8a76bd4e8ffce7aa1cb31056d57d0134e254753e53cefe17765a8aa3e5a9e657c50e78466e98e750631660b2c7ea8975fc77aa87b7eba

    • SSDEEP

      3072:sdjFOoTVq4m0zRilymyU3pQuz1T5SKiVi6n:4M2ZmEoL3Cu6KI

    • Underground Team

      Underground Team is a ransomware first seen in July 2023 that is primarily distriuted via exploting vulnerabilities.

    • Clears Windows event logs

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Drops desktop.ini file(s)

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

MITRE ATT&CK Enterprise v15

Tasks