Resubmissions

16-10-2024 02:26

241016-cwyacaxhmd 10

16-10-2024 02:19

241016-csapwasbjm 10

General

  • Target

    4affa384ff6ab351df42fc3a02716670_JaffaCakes118

  • Size

    364KB

  • Sample

    241016-cwyacaxhmd

  • MD5

    4affa384ff6ab351df42fc3a02716670

  • SHA1

    7bebae1ad50fd27c3df625dc3995256f7d8bb8c2

  • SHA256

    4f1e783f68071d95e0b07e1f8b80ed49d0d94a089ae96016b197f846350cfe66

  • SHA512

    802616cac860ed2facd74387475e45ecd5a9e00fb106db801cd0168659fcecb9bb0ca6afb4cfeeca592d24d20c07add685e9a65c3178c839d37850a324906070

  • SSDEEP

    6144:rHDYm7R++Qhm/FxsB+lIB+0ODLawCi308Ki7B4iTK24D1sr:rHr2mwB+g03S5idVK24Zsr

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\+REcovER+jpspt+.txt

Ransom Note
{}_~_~+ -$.-_+$|~~_|| =|_$.**+-~| $+|=*.-=| !!! IMPORTANT INFORMATION !!!! All of your files are encrypted with RSA-4096. More information about the RSA algorythm can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) Decrypting of your files is only possible with the private key and decrypt program, which is on our secret server. To receive your private key follow one of the links: 1. http://88fga.ketteaero.com/80DFA9A1775787B3 2. http://2bdfb.spinakrosa.at/80DFA9A1775787B3 3. http://uj5nj.onanwhit.com/80DFA9A1775787B3 If all of the addresses are not available, follow these steps: 1. Download and install Tor Browser: https://www.torproject.org/download/download-easy.html 2. After a successful installation, run the browser and wait for initialization. 3. Type in the address bar: k7tlx3ghr3m4n2tu.onion/80DFA9A1775787B3 4. Follow the instructions on the site. !!! Your personal identification ID: 80DFA9A1775787B3 !!! )(*=~_$~+$==-$*~=$$ __$-=-+*
URLs

http://88fga.ketteaero.com/80DFA9A1775787B3

http://2bdfb.spinakrosa.at/80DFA9A1775787B3

http://uj5nj.onanwhit.com/80DFA9A1775787B3

http://k7tlx3ghr3m4n2tu.onion/80DFA9A1775787B3

Extracted

Path

C:\Program Files\7-Zip\Lang\+REcovER+ekeqp+.txt

Ransom Note
{}_~_~+ -$.-_+$|~~_|| =|_$.**+-~| $+|=*.-=| !!! IMPORTANT INFORMATION !!!! All of your files are encrypted with RSA-4096. More information about the RSA algorythm can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) Decrypting of your files is only possible with the private key and decrypt program, which is on our secret server. To receive your private key follow one of the links: 1. http://88fga.ketteaero.com/E6E1AF4D163F959 2. http://2bdfb.spinakrosa.at/E6E1AF4D163F959 3. http://uj5nj.onanwhit.com/E6E1AF4D163F959 If all of the addresses are not available, follow these steps: 1. Download and install Tor Browser: https://www.torproject.org/download/download-easy.html 2. After a successful installation, run the browser and wait for initialization. 3. Type in the address bar: k7tlx3ghr3m4n2tu.onion/E6E1AF4D163F959 4. Follow the instructions on the site. !!! Your personal identification ID: E6E1AF4D163F959 !!! )(*=~_$~+$==-$*~=$$ __$-=-+*
URLs

http://88fga.ketteaero.com/E6E1AF4D163F959

http://2bdfb.spinakrosa.at/E6E1AF4D163F959

http://uj5nj.onanwhit.com/E6E1AF4D163F959

http://k7tlx3ghr3m4n2tu.onion/E6E1AF4D163F959

Targets

    • Target

      4affa384ff6ab351df42fc3a02716670_JaffaCakes118

    • Size

      364KB

    • MD5

      4affa384ff6ab351df42fc3a02716670

    • SHA1

      7bebae1ad50fd27c3df625dc3995256f7d8bb8c2

    • SHA256

      4f1e783f68071d95e0b07e1f8b80ed49d0d94a089ae96016b197f846350cfe66

    • SHA512

      802616cac860ed2facd74387475e45ecd5a9e00fb106db801cd0168659fcecb9bb0ca6afb4cfeeca592d24d20c07add685e9a65c3178c839d37850a324906070

    • SSDEEP

      6144:rHDYm7R++Qhm/FxsB+lIB+0ODLawCi308Ki7B4iTK24D1sr:rHr2mwB+g03S5idVK24Zsr

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks