General

  • Target

    RNSM00423.7z

  • Size

    51.9MB

  • Sample

    241027-tltylszfll

  • MD5

    239ccbce50c59713e3c466367b787691

  • SHA1

    fcec0a4eb1626ecbda7c018040a386e1721cc83d

  • SHA256

    4f848bba2e46afeb3ea7e05989ce079d72840b35449625c956b83ba12234e92d

  • SHA512

    f94370f2588c1627b3796b731f237b681f75c4c6ae197d4ace6d44659fb74e73922b5109ab7e204867e4177278787d7045c6e69763afeed2f0ae6831db955bcf

  • SSDEEP

    1572864:/LHP6QVWDjQhUxRoCuhsVIoRNzps5D1D99LkBAK5a:jHPZVckhQQsVTNKb1

Malware Config

Extracted

Path

C:\Program Files\dotnet\Restore-My-Files.txt

Family

lockbit

Ransom Note
All your important files are encrypted! Any attempts to restore your files with the thrid-party software will be fatal for your files! RESTORE YOU DATA POSIBLE ONLY BUYING private key from us. There is only one way to get your files back: 1) Through a standard browser(FireFox, Chrome, Edge, Opera) | 1. Open link http://lockbit-decryptor.top/?BC76D224712A7481B8B2035393FAA5EE | 2. Follow the instructions on this page 2) Through a Tor Browser - recommended | 1. Download Tor browser - https://www.torproject.org/ and install it. | 2. Open link in TOR browser - http://lockbitks2tvnmwk.onion/?BC76D224712A7481B8B2035393FAA5EE This link only works in Tor Browser! | 3. Follow the instructions on this page ### Attention! ### # lockbit-decryptor.top may be blocked. We recommend using a Tor browser to access the site # Do not rename encrypted files. # Do not try to decrypt using third party software, it may cause permanent data loss. # Decryption of your files with the help of third parties may cause increased price(they add their fee to our). # Tor Browser may be blocked in your country or corporate network. Use https://bridges.torproject.org or use Tor Browser over VPN. # Tor Browser user manual https://tb-manual.torproject.org/about
URLs

http://lockbit-decryptor.top/?BC76D224712A7481B8B2035393FAA5EE

http://lockbitks2tvnmwk.onion/?BC76D224712A7481B8B2035393FAA5EE

Extracted

Family

bitrat

Version

1.34

C2

zwlknt25w6fs6ffnkllvutcepgp7mz6dsndkbki4l2fr27rnk7o4b7yd.onion:80

Attributes
  • communication_password

    81dc9bdb52d04dc20036dbd8313ed055

  • tor_process

    TORBUILD

Extracted

Path

F:\readme-warning.txt

Family

makop

Ransom Note
::: Greetings ::: Little FAQ: .1. Q: Whats Happen? A: Your files have been encrypted and now have the "fair" extension. The file structure was not damaged, we did everything possible so that this could not happen. .2. Q: How to recover files? A: If you wish to decrypt your files you will need to pay in bitcoins. .3. Q: What about guarantees? A: Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will cooperate with us. Its not in our interests. To check the ability of returning files, you can send to us any 2 files with SIMPLE extensions(jpg,xls,doc, etc... not databases!) and low sizes(max 1 mb), we will decrypt them and send back to you. That is our guarantee. .4. Q: How to contact with you? A: You can write us to our mailbox: [email protected] .5. Q: How will the decryption process proceed after payment? A: After payment we will send to you our scanner-decoder program and detailed instructions for use. With this program you will be able to decrypt all your encrypted files. .6. Q: If I don�t want to pay bad people like you? A: If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause only we have the private key. In practice - time is much more valuable than money. :::BEWARE::: DON'T try to change encrypted files by yourself! If you will try to use any third party software for restoring your data or antivirus solutions - please make a backup for all encrypted files! Any changes in encrypted files may entail damage of the private key and, as result, the loss all data.

Targets

    • Target

      RNSM00423.7z

    • Size

      51.9MB

    • MD5

      239ccbce50c59713e3c466367b787691

    • SHA1

      fcec0a4eb1626ecbda7c018040a386e1721cc83d

    • SHA256

      4f848bba2e46afeb3ea7e05989ce079d72840b35449625c956b83ba12234e92d

    • SHA512

      f94370f2588c1627b3796b731f237b681f75c4c6ae197d4ace6d44659fb74e73922b5109ab7e204867e4177278787d7045c6e69763afeed2f0ae6831db955bcf

    • SSDEEP

      1572864:/LHP6QVWDjQhUxRoCuhsVIoRNzps5D1D99LkBAK5a:jHPZVckhQQsVTNKb1

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • Bitrat family

    • Lockbit

      Ransomware family with multiple variants released since late 2019.

    • Lockbit family

    • Makop

      Ransomware family discovered by @VK_Intel in early 2020.

    • Makop family

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Redline family

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • ModiLoader Second Stage

    • Modifies boot configuration data using bcdedit

    • Deletes backup catalog

      Uses wbadmin.exe to inhibit system recovery.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks