General
-
Target
RNSM00440.7z
-
Size
83.7MB
-
Sample
241024-zcnccstckb
-
MD5
075245de36e675fca5b3b7bbbe2559aa
-
SHA1
1c194f80535d39509f318bb6cee62b904bd3ec7d
-
SHA256
3505d0b242e1b4ffa9d11c5769494ea7314ec48dcb27b1b34900f60a10430249
-
SHA512
052d0c44f6d618b4a3ceaae700f7d0fe4fb720965e797c210d9d1fab6e75ff0b905ca2a0dd6cb7fe2838c7f835f89e2a9b23522c7a5c5d09f531ded6f02e3a91
-
SSDEEP
1572864:Fr0PvDw4YpeQwkYquZmWyVbU2lGzZmPA7IGIxjumOahRDjPAT60olU+SbBWvDzF9:GPrBYBYqVWyVo2lGVmAkZuB8NE6BlU+J
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00440.7z
Resource
win10v2004-20241007-en
Malware Config
Extracted
crimsonrat
134.119.181.142
130.5.26.108
104.144.198.105
Extracted
C:\Users\Admin\Downloads\UFVgTf_readme_.txt
avaddon
Extracted
djvu
http://asvb.top/nddddhsspen6/get.php
-
extension
.paas
-
offline_id
LQbDo3EfIVHxGuJOWRJdmxgY66rD6kiyqz4tzyt1
-
payload_url
http://asvb.top/files/penelop/updatewin1.exe
http://asvb.top/files/penelop/updatewin2.exe
http://asvb.top/files/penelop/updatewin.exe
http://asvb.top/files/penelop/3.exe
http://asvb.top/files/penelop/4.exe
http://asvb.top/files/penelop/5.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-B0FsLNO3fN Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0300ewgfDd
Extracted
F:\ukRcI_readme_.txt
avaddon
http://avaddongun7rngel.onion
http://avaddonbotrxmuyl.onion
Extracted
netwire
haija.mine.nu:1339
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
C4
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
qays1122
-
registry_autorun
false
-
use_mutex
false
Extracted
C:\Program Files\readme.txt
conti
http://contirecj4hbzmyzuydyzrvm2c65blmvhoj2cvf25zqj2dwrrqcq5oad.onion/
https://contirecovery.best
Extracted
C:\Users\Admin\Desktop\RESTORE_FILES_INFO.txt
prometheus
http://promethw27cbrcot.onion/ticket.php?track=AA4-MX4-GGQD
Targets
-
-
Target
RNSM00440.7z
-
Size
83.7MB
-
MD5
075245de36e675fca5b3b7bbbe2559aa
-
SHA1
1c194f80535d39509f318bb6cee62b904bd3ec7d
-
SHA256
3505d0b242e1b4ffa9d11c5769494ea7314ec48dcb27b1b34900f60a10430249
-
SHA512
052d0c44f6d618b4a3ceaae700f7d0fe4fb720965e797c210d9d1fab6e75ff0b905ca2a0dd6cb7fe2838c7f835f89e2a9b23522c7a5c5d09f531ded6f02e3a91
-
SSDEEP
1572864:Fr0PvDw4YpeQwkYquZmWyVbU2lGzZmPA7IGIxjumOahRDjPAT60olU+SbBWvDzF9:GPrBYBYqVWyVo2lGVmAkZuB8NE6BlU+J
-
Avaddon
Ransomware-as-a-service first released in June 2020 and currently expanding its userbase among criminal actors.
-
Avaddon payload
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
CrimsonRAT main payload
-
Detect ZGRat V2
-
Detected Djvu ransomware
-
GandCrab payload
-
NetWire RAT payload
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Prometheus Ransomware
Ransomware family mostly targeting manufacturing industry and claims to be affiliated with REvil.
-
Thanos executable
-
Clears Windows event logs
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Downloads MZ/PE file
-
Downloads PsExec from SysInternals website
Sysinternals tools like PsExec are often leveraged maliciously by malware families due to being commonly used by testers/administrators.
-
Modifies Windows Firewall
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Modifies file permissions
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Uses the VBS compiler for execution
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
3PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
3Service Execution
3Windows Management Instrumentation
1Persistence
Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Access Token Manipulation
1Create Process with Token
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Access Token Manipulation
1Create Process with Token
1Direct Volume Access
1File and Directory Permissions Modification
1Impair Defenses
2Disable or Modify System Firewall
1Indicator Removal
4Clear Windows Event Logs
1File Deletion
3Modify Registry
1Discovery
Network Service Discovery
1Peripheral Device Discovery
1Process Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1