General

  • Target

    2024-10-12_ef827ebee30719f730910561f3a22ca6_crysis_dharma

  • Size

    92KB

  • Sample

    241012-rstv3sverf

  • MD5

    ef827ebee30719f730910561f3a22ca6

  • SHA1

    0e72f4b6bc4350c49ad12e8727249a9e57d5df35

  • SHA256

    b6feb416c9ae233d3c5c0453deb42ce0b3a2832fc89bb3ab793e5bf4668c5992

  • SHA512

    7aa4fe7d0c8e55dd30ea765537597e1efdf0640aed0908d8fbce05eeae27a6dcba83db73cf116c6ba5377e03b968c4245b048636002c1cb665bfaa25da625a6f

  • SSDEEP

    1536:mBwl+KXpsqN5vlwWYyhY9S4AM7z9b6rK15thqR3PYA86Euz0n:Qw+asqN5aW/hLG7RnhqtqU0n

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta

Ransom Note
All FILES ENCRYPTED "RSA1024" All YOUR FILES HAVE BEEN ENCRYPTED!!! IF YOU WANT TO RESTORE THEM, WRITE US TO THE E-MAIL [email protected] IN THE LETTER WRITE YOUR ID, YOUR ID 1ABB5E5C IF YOU ARE NOT ANSWERED, WRITE TO EMAIL: [email protected] YOUR SECRET KEY WILL BE STORED ON A SERVER 7 DAYS, AFTER 7 DAYS IT MAY BE OVERWRITTEN BY OTHER KEYS, DON'T PULL TIME, WAITING YOUR EMAIL FREE DECRYPTION FOR PROOF You can send us up to 1 file for free decryption. The total size of files must be less than 1Mb (non archived), and files should not contain valuable information. (databases,backups, large excel sheets, etc.) DECRYPTION PROCESS: When you make sure of decryption possibility transfer the money to our bitcoin wallet. As soon as we receive the money we will send you: 1. Decryption program. 2. Detailed instruction for decryption. 3. And individual keys for decrypting your files. !WARNING! Do not rename encrypted files. Do not try to decrypt your data using third party software, it may cause permanent data loss. Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.

Extracted

Path

C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta

Ransom Note
All FILES ENCRYPTED "RSA1024" All YOUR FILES HAVE BEEN ENCRYPTED!!! IF YOU WANT TO RESTORE THEM, WRITE US TO THE E-MAIL [email protected] IN THE LETTER WRITE YOUR ID, YOUR ID 04C81A10 IF YOU ARE NOT ANSWERED, WRITE TO EMAIL: [email protected] YOUR SECRET KEY WILL BE STORED ON A SERVER 7 DAYS, AFTER 7 DAYS IT MAY BE OVERWRITTEN BY OTHER KEYS, DON'T PULL TIME, WAITING YOUR EMAIL FREE DECRYPTION FOR PROOF You can send us up to 1 file for free decryption. The total size of files must be less than 1Mb (non archived), and files should not contain valuable information. (databases,backups, large excel sheets, etc.) DECRYPTION PROCESS: When you make sure of decryption possibility transfer the money to our bitcoin wallet. As soon as we receive the money we will send you: 1. Decryption program. 2. Detailed instruction for decryption. 3. And individual keys for decrypting your files. !WARNING! Do not rename encrypted files. Do not try to decrypt your data using third party software, it may cause permanent data loss. Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.

Targets

    • Target

      2024-10-12_ef827ebee30719f730910561f3a22ca6_crysis_dharma

    • Size

      92KB

    • MD5

      ef827ebee30719f730910561f3a22ca6

    • SHA1

      0e72f4b6bc4350c49ad12e8727249a9e57d5df35

    • SHA256

      b6feb416c9ae233d3c5c0453deb42ce0b3a2832fc89bb3ab793e5bf4668c5992

    • SHA512

      7aa4fe7d0c8e55dd30ea765537597e1efdf0640aed0908d8fbce05eeae27a6dcba83db73cf116c6ba5377e03b968c4245b048636002c1cb665bfaa25da625a6f

    • SSDEEP

      1536:mBwl+KXpsqN5vlwWYyhY9S4AM7z9b6rK15thqR3PYA86Euz0n:Qw+asqN5aW/hLG7RnhqtqU0n

    • Dharma

      Dharma is a ransomware that uses security software installation to hide malicious activities.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (311) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks