General
-
Target
RNSM00403.7z
-
Size
60.6MB
-
Sample
241030-1hdwjs1hna
-
MD5
f61f92161d115bc21c47483258803ca7
-
SHA1
56c8ce8f2a6104b40f1a88d1b42f083dad7a9de9
-
SHA256
8aeb260c2e350147f992e73b8f6fedba94fd04d12e8a2ba3e4ec8500baa13830
-
SHA512
25e5061c1ed6c457c7f46bad5f19b27369dc4409f40c02bc2f63e39d102aa54a1ed7532018ef8a8c3469e574daf1c6ba8160c24ea5efbeaa8f5b97dfc63fe173
-
SSDEEP
1572864:xLROHSmpHJN4vOB7FHXhWZHEvM33yiUY92Y3FCC7m9tx3Yrr:NROySTWw+yvwita2E7+tx3YP
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00403.7z
Resource
win10v2004-20241007-en
Malware Config
Extracted
mespinoza
-
ransomnote
Hi Company, Every byte on any types of your devices was encrypted. Don't try to use backups because it were encrypted too. To get all your data back contact us: [email protected] [email protected] -------------- FAQ: 1. Q: How can I make sure you don't fooling me? A: You can send us 2 files(max 2mb). 2. Q: What to do to get all data back? A: Don't restart the computer, don't move files and write us. 3. Q: What to tell my boss? A: Protect Your System Amigo.
Extracted
F:\$RECYCLE.BIN\S-1-5-21-3227495264-2217614367-4027411560-1000\Readme.README
Extracted
C:\Program Files (x86)\readme.txt
conti
http://m232fdxbfmbrcehbrj5iayknxnggf6niqfj6x4iedrgtab4qupzjlaid.onion
https://contirecovery.info
Extracted
C:\Recovery\README.d96d1f6d.TXT
darkside
http://darksidedxcftmqa.onion/blog/article/id/6/dQDclB_6Kg-c-6fJesONyHoaKh9BtI8j9Wkw2inG8O72jWaOcKbrxMWbPfKrUbHC
http://darksidfqzcuhtk2.onion/K71D6P88YTX04R3ISCJZHMD5IYV55V9247QHJY0HJYUXX68H2P05XPRIR5SP2U68
Extracted
C:\Program Files\Crashpad\attachments\Restore-My-Files.txt
lockbit
http://lockbit-decryptor.top/?8841DD9B0AC925FF9D181C92893BBBCE
http://lockbitks2tvnmwk.onion/?8841DD9B0AC925FF9D181C92893BBBCE
Targets
-
-
Target
RNSM00403.7z
-
Size
60.6MB
-
MD5
f61f92161d115bc21c47483258803ca7
-
SHA1
56c8ce8f2a6104b40f1a88d1b42f083dad7a9de9
-
SHA256
8aeb260c2e350147f992e73b8f6fedba94fd04d12e8a2ba3e4ec8500baa13830
-
SHA512
25e5061c1ed6c457c7f46bad5f19b27369dc4409f40c02bc2f63e39d102aa54a1ed7532018ef8a8c3469e574daf1c6ba8160c24ea5efbeaa8f5b97dfc63fe173
-
SSDEEP
1572864:xLROHSmpHJN4vOB7FHXhWZHEvM33yiUY92Y3FCC7m9tx3Yrr:NROySTWw+yvwita2E7+tx3YP
-
Conti family
-
DarkSide
Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.
-
Darkside family
-
Demonware family
-
GandCrab payload
-
Gandcrab family
-
Glupteba family
-
Lockbit family
-
Mespinoza Ransomware
Also known as Pysa. Ransomware-as-a-servoce which first appeared in 2020.
-
Mespinoza family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Modifies boot configuration data using bcdedit
-
Renames multiple (1592) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Direct Volume Access
1Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
3File Deletion
3Modify Registry
4Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1