General

  • Target

    RNSM00294.7z

  • Size

    18.3MB

  • Sample

    241117-vvq4ravcmd

  • MD5

    35f36146d16e76854de00c15cd264590

  • SHA1

    9b9cbc5a04440a9e6f677bbced1ba1c87b3fa77f

  • SHA256

    ac2e8a7e7efa633d42c18b4fb526aca8a64730f647bd31ee6dc739092051c837

  • SHA512

    d17ade4aa19156b185655a33e9645ab0f1762558e8c0ddd441b23c931755ea0c21893a7e5446b8bbe27c504d0f355c556777e0400aba318e24d5ca9c472a837c

  • SSDEEP

    393216:SBqZJmSJMZd5kVWyO7fIFmgUh1dAnA3cIDbfXGJ8o7hnvHEYML05Ei:ScZP+ZrHyOTknUh1dIkjXGmShnBML4B

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.unlockers.us
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    1122334455

Extracted

Path

C:\Users\Public\Videos\how_to_back_files.html

Ransom Note
<html> <head> <meta charset="utf-8"> <title>HOW TO DECRYPT YOUR FILES</title> <style type="text/css"> body { font: 15px Tahoma, sans-serif; margin: 10px; line-height: 25px; background-color: #C1AB8F; } .bold { font-weight: bold; } .xx { border: 1px dashed #000; background: #E3D5F1; } .mark { background: #D0D0E8; padding: 2px 5px; } .header { font-size: 30px; height: 50px; line-height: 50px; font-weight: bold; border-bottom: 10px solid #D0D0E8; } .info { background: #D0D0E8; border-left: 10px solid #00008B; } .alert { background: #FFE4E4; border-left: 10px solid #FF0000; } .private { border: 1px dashed #000; background: #FFFFEF; } .note { height: auto; padding-bottom: 1px; margin: 15px 0; } .note .title { font-weight: bold; text-indent: 10px; height: 30px; line-height: 30px; padding-top: 10px; } .note .mark { background: #A2A2B5; } .note ul { margin-top: 0; } .note pre { margin-left: 15px; line-height: 13px; font-size: 13px; } </style> </head> <body> <div class="header">Your files are encrypted!</div> <div class="note private"> <div class="title">Your personal ID</div> <pre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pre><!-- !!! CTpoкy He MeHяTb !!! --> </div> <div class="bold"> <div align="left">All your important data has been encrypted.</div> </div> <div class="bold">To recover data you need decryptor.</div> <div> <h2 align="center">To get the decryptor you should:</h2> <h1 align="left">pay for decrypt:</h1> <div class="note xx"> <div align="left"> <h1>site for buy bitcoin:<br> </h1> </div> <div align="left"> <strong>Buy 0.5 BTC on one of these sites</strong> </div> <div align="left"> <ol> <li><strong>https://localbitcoins.com</strong></li> <li><strong>https://www.coinbase.com</strong></li> <li><strong>https://xchange.cc</strong></li> </ol> </div> <div align="left"> <h1>bitcoin adress for pay:<br> </h1> </div> <div align="left">1CBvRW5FvDSMXU8RXdvMxzPP25QzsjH4Qg</div> <div align="left"><strong>Send 0.5 BTC for decrypt</strong></div> </div> <div> <h1>After the payment: </h1> </div> <div><p>Send screenshot of payment to <span class="mark">[email protected]</span>. In the letter include your personal ID (look at the beginning of this document).</p> </div> <div> <h1 align="center">After you will receive a decryptor and instructions</h1> </div> <div class="note alert"> <div class="title">Attention!</div> <ul><li>No Payment = No decryption</li> <li>You really get the decryptor after payment</li> <li>We give you the opportunity to decipher 1 file free of charge!</li> <li>You can make sure that the service really works and after payment for the «Decryptor» program you can actually decrypt the files!</li> <li>Do not attempt to remove the program or run the anti-virus tools</li> <li>Attempts to self-decrypting files will result in the loss of your data</li> <li>Decoders other users are not compatible with your data, because each user's unique encryption key</li> </ul> </div> </body> </html>
Emails

class="mark">[email protected]</span>

Extracted

Path

C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+iabxp.txt

Ransom Note
__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#! NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA-4096. More information about the encryption keys using RSA-4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA-4096 KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://p57gest54celltraf743knjf.mottesapo.com/A97B535C5665D87 2. http://k4restportgonst34d23r.oftpony.at/A97B535C5665D87 3. http://rr7mdgjbjhbefvkhbashrg.ginnypecht.com/A97B535C5665D87 If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser and wait for initialization 3. Type in the address bar: fwgrhsao3aoml7ej.onion/A97B535C5665D87 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *** Your personal pages: http://p57gest54celltraf743knjf.mottesapo.com/A97B535C5665D87 http://k4restportgonst34d23r.oftpony.at/A97B535C5665D87 http://rr7mdgjbjhbefvkhbashrg.ginnypecht.com/A97B535C5665D87 *** Your personal page Tor-Browser: fwgrhsao3aoml7ej.ONION/A97B535C5665D87 *** Your personal identification ID: A97B535C5665D87
URLs

http://p57gest54celltraf743knjf.mottesapo.com/A97B535C5665D87

http://k4restportgonst34d23r.oftpony.at/A97B535C5665D87

http://rr7mdgjbjhbefvkhbashrg.ginnypecht.com/A97B535C5665D87

http://fwgrhsao3aoml7ej.onion/A97B535C5665D87

http://fwgrhsao3aoml7ej.ONION/A97B535C5665D87

Extracted

Path

C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+ireyp.txt

Ransom Note
__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#! NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA-4096. More information about the encryption keys using RSA-4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA-4096 KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. Decrypting of your files is only possible with the help of the private key and decrypt program, which is on our secret server. What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://rr7mdgjbjhbefvkhbashrg.ginnypecht.com/A97B535C5665D87 2. http://kk4dshfjn45tsnkdf34fg.tatiejava.at/A97B535C5665D87 3. http://94375hfsjhbdfkj5wfg.aladadear.com/A97B535C5665D87 If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser and wait for initialization 3. Type in the address bar: fwgrhsao3aoml7ej.onion/A97B535C5665D87 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *** Your personal pages: http://rr7mdgjbjhbefvkhbashrg.ginnypecht.com/A97B535C5665D87 http://kk4dshfjn45tsnkdf34fg.tatiejava.at/A97B535C5665D87 http://94375hfsjhbdfkj5wfg.aladadear.com/A97B535C5665D87 *** Your personal page Tor-Browser: fwgrhsao3aoml7ej.ONION/A97B535C5665D87 *** Your personal identification ID: A97B535C5665D87
URLs

http://rr7mdgjbjhbefvkhbashrg.ginnypecht.com/A97B535C5665D87

http://kk4dshfjn45tsnkdf34fg.tatiejava.at/A97B535C5665D87

http://94375hfsjhbdfkj5wfg.aladadear.com/A97B535C5665D87

http://fwgrhsao3aoml7ej.onion/A97B535C5665D87

http://fwgrhsao3aoml7ej.ONION/A97B535C5665D87

Extracted

Path

C:\Users\Admin\Contacts\_README_.hta

Ransom Note
<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <title>CERBER RANSOMWARE: Instructions</title> <HTA:APPLICATION APPLICATIONNAME="CERBER RANSOMWARE: Instructions" SCROLL="yes" SINGLEINSTANCE="yes" WINDOWSTATE="maximize"> <style> a { color: #04a; text-decoration: none; } a:hover { text-decoration: underline; } body { background-color: #e7e7e7; color: #222; font-family: "Lucida Sans Unicode", "Lucida Grande", sans-serif; font-size: 13pt; line-height: 19pt; } body, h1 { margin: 0; padding: 0; } hr { color: #bda; height: 2pt; margin: 1.5%; } h1 { color: #555; font-size: 14pt; } ol { padding-left: 2.5%; } ol li { padding-bottom: 13pt; } small { color: #555; font-size: 11pt; } ul { list-style-type: none; margin: 0; padding: 0; } .button { color: #04a; cursor: pointer; } .button:hover { text-decoration: underline; } .container { background-color: #fff; border: 2pt solid #c7c7c7; margin: 2.5%; min-width: 850px; padding: 2.5%; } .header { border-bottom: 2pt solid #c7c7c7; margin-bottom: 2.5%; padding-bottom: 2.5%; } .hr { background: #bda; display: block; height: 2pt; margin-top: 1.5%; margin-bottom: 1.5%; overflow: hidden; width: 100%; } .info { background-color: #efe; border: 2pt solid #bda; display: inline-block; padding: 1.5%; text-align: center; } .updating { color: red; display: none; } #change_language { float: right; } #change_language, #texts div { display: none; } </style> </head> <body> <div class="container"> <div class="header"> <a href="#" id="change_language" onclick="return changeLanguage();" title="English">&#9745; English</a> <h1>CERBER RANSOMWARE</h1> <small id="title">Instructions</small> </div> <div id="languages"> <p>&#9745; Select your language</p> <ul> <li><a href="#" title="English" onclick="return showBlock('en');">English</a></li> <li><a href="#" title="Arabic" onclick="return showBlock('ar');">العربية</a></li> <li><a href="#" title="Chinese" onclick="return showBlock('zh');">中文</a></li> <li><a href="#" title="Dutch" onclick="return showBlock('nl');">Nederlands</a></li> <li><a href="#" title="French" onclick="return showBlock('fr');">Français</a></li> <li><a href="#" title="German" onclick="return showBlock('de');">Deutsch</a></li> <li><a href="#" title="Italian" onclick="return showBlock('it');">Italiano</a></li> <li><a href="#" title="Japanese" onclick="return showBlock('ja');">日本語</a></li> <li><a href="#" title="Korean" onclick="return showBlock('ko');">한국어</a></li> <li><a href="#" title="Polish" onclick="return showBlock('pl');">Polski</a></li> <li><a href="#" title="Portuguese" onclick="return showBlock('pt');">Português</a></li> <li><a href="#" title="Spanish" onclick="return showBlock('es');">Español</a></li> <li><a href="#" title="Turkish" onclick="return showBlock('tr');">Türkçe</a></li> </ul> </div> <div id="texts"> <div id="en"> <p>Can't you find the necessary files?<br>Is the content of your files not readable?</p> <p>It is normal because the files' names and the data in your files have been encrypted by "Cerber&nbsp;Ransomware".</p> <p>It means your files are NOT damaged! Your files are modified only. This modification is reversible.<br>From now it is not possible to use your files until they will be decrypted.</p> <p>The only way to decrypt your files safely is to buy the special decryption software "Cerber&nbsp;Decryptor".</p> <p>Any attempts to restore your files with the third-party software will be fatal for your files!</p> <hr> <p class="w331208">You can proceed with purchasing of the decryption software at your personal page:</p> <p><span class="info"><span class="updating">Please wait...</span><a id="megaurl" class="url" href="http://ffoqr3ug7m726zou.od3rag.top/9919-3BBE-CBC8-0073-53BE" target="_blank">http://ffoqr3ug7m726zou.od3rag.top/9919-3BBE-CBC8-0073-53BE</a><span class="hr"></span><a href="http://ffoqr3ug7m726zou.3pxhgt.top/9919-3BBE-CBC8-0073-53BE" target="_blank">http://ffoqr3ug7m726zou.3pxhgt.top/9919-3BBE-CBC8-0073-53BE</a><span class="hr"></span><a href="http://ffoqr3ug7m726zou.onion.to/9919-3BBE-CBC8-0073-53BE" target="_blank">http://ffoqr3ug7m726zou.onion.to/9919-3BBE-CBC8-0073-53BE</a></span></p> <p>If this page cannot be opened &nbsp;<span class="button" onclick="return updateUrl();">click here</span>&nbsp; to generate a new address to your personal page.</p> <p>At this page you will receive the complete instructions how to buy the decryption software for restoring all your files.</p> <p>Also at this page you will be able to restore any one file for free to be sure "Cerber&nbsp;Decryptor" will help you.</p> <hr> <p>If your personal page is not available for a long period there is another way to open your personal page - installation and use of Tor&nbsp;Browser:</p> <ol> <li>run your Internet browser (if you do not know what it is run the Internet&nbsp;Explorer);</li> <li>enter or copy the address <a href="https://www.torproject.org/download/download-easy.html.en" target="_blank">https://www.torproject.org/download/download-easy.html.en</a> into the address bar of your browser and press ENTER;</li> <li>wait for the site loading;</li> <li>on the site you will be offered to download Tor&nbsp;Browser; download and run it, follow the installation instructions, wait until the installation is completed;</li> <li>run Tor&nbsp;Browser;</li> <li>connect with the button "Connect" (if you use the English version);</li> <li>a normal Internet browser window will be opened after the initialization;</li> <li>type or copy the address <br><span class="info">http://ffoqr3ug7m726zou.onion/9919-3BBE-CBC8-0073-53BE</span><br> in this browser address bar;</li> <li>press ENTER;</li> <li>the site should be loaded; if for some reason the site is not loading wait for a moment and try again.</li> </ol> <p>If you have any problems during installation or use of Tor&nbsp;Browser, please, visit <a href="https://www.youtube.com/results?search_query=Install+Tor+Browser+Windows" target="_blank">https://www.youtube.com</a> and type request in the search bar "Install Tor&nbsp;Browser Windows" and you will find a lot of training videos about Tor&nbsp;Browser installation and use.</p> <hr> <p><strong>Additional information:</strong></p> <p>You will find the instructions ("*.hta") for restoring your files in any folder with your encrypted files.</p> <p>The instructions ("*.hta") in the folders with your encrypted files are not viruses! The instructions ("*.hta") will help you to decrypt your files.</p> <p>Remember! The worst situation already happened and now the future of your files depends on your determination and speed of your actions.</p> </div> <div id="ar" style="direction: rtl;"> <p>لا يمكنك العثور على الملفات الضرورية؟<br>هل محتوى الملفات غير قابل للقراءة؟</p> <p>هذا أمر طبيعي لأن أسماء الملفات والبيانات في الملفات قد تم تشفيرها بواسطة "Cerber&nbsp;Ransomware".</p> <p>وهذا يعني أن الملفات الخاصة بك ليست تالفة! فقد تم تعديل ملفاتك فقط. ويمكن التراجع عن هذا.<br>ومن الآن فإنه لا يكن استخدام الملفات الخاصة بك حتى يتم فك تشفيرها.</p> <p>الطريقة الوحيدة لفك تشفير ملفاتك بأمان هو أن تشتري برنامج فك التشفير المتخصص "Cerber&nbsp;Decryptor".</p> <p>إن أية محاولات لاستعادة الملفات الخاصة بك بواسطة برامج من طرف ثالث سوف تكون مدمرة لملفاتك!</p> <hr> <p>يمكنك الشروع في شراء برنامج فك التشفير من صفحتك الشخصية:</p> <p><span class="info"><span class="updating">أرجو الإنتظار...</span><a class="url" href="http://ffoqr3ug7m726zou.od3rag.top/9919-3BBE-CBC8-0073-53BE" target="_blank">http://ffoqr3ug7m726zou.od3rag.top/9919-3BBE-CBC8-0073-53BE</a><span class="hr"></span><a href="http://ffoqr3ug7m726zou.3pxhgt.top/9919-3BBE-CBC8-0073-53BE" target="_blank">http://ffoqr3ug7m726zou.3pxhgt.top/9919-3BBE-CBC8-0073-53BE</a><span class="hr"></span><a href="http://ffoqr3ug7m726zou.onion.to/9919-3BBE-CBC8-0073-53BE" target="_blank">http://ffoqr3ug7m726zou.onion.to/9919-3BBE-CBC8-0073-53BE</a></span></p> <p>في حالة تعذر فتح هذه الصفحة &nbsp;<span class="button" onclick="return updateUrl();">انقر هنا</span>&nbsp; لإنشاء عنوان جديد لصفحتك الشخصية.</p> <p>في هذه الصفحة سوف تتلقى تعليمات كاملة حول كيفية شراء برنامج فك التشفير لاستعادة جميع الملفات الخاصة بك.</p> <p>في هذه الصفحة أيضًا سوف تتمكن من استعادة ملف واحد بشكل مجاني للتأكد من أن "Cerber&nbsp;Decryptor" سوف يساعدك.</p> <hr> <p>إذا كانت صفحتك الشخصية غير متاحة لفترة طويلة فإن ثمّة طريقة أخرى لفتح صفحتك الشخصية - تحميل واستخدام متصفح Tor:</p> <ol> <li>قم بتشغيل متصفح الإنترنت الخاص بك (إذا كنت لا تعرف ما هو قم بتشغيل إنترنت إكسبلورر);</li> <li>قم بكتابة أو نسخ العنوان <a href="https://www.torproject.org/download/download-easy.html.en" target="_blank">https://www.torproject.org/download/download-easy.html.en</a> إلى شريط العنوان في المستعرض الخاص بك ثم اضغط ENTER;</li> <li>انتظر لتحميل الموقع;</li> <li>سوف يعرض عليك الموقع تحميل متصفح Tor. قم بتحميله وتشغيله، واتبع تعليمات التثبيت، وانتظر حتى اكتمال التثبيت;</li> <li>قم بتشغيل متصفح Tor;</li> <li>اضغط على الزر "Connect" (إذا كنت تستخدم النسخة الإنجليزية);</li> <li>سوف تُفتح نافذة متصفح الإنترنت العادي بعد البدء;</li> <li>قم بكتابة أو نسخ العنوان <br><span class="info">http://ffoqr3ug7m726zou.onion/9919-3BBE-CBC8-0073-53BE</span><br> في شريط العنوان في المتصفح;</li> <li>اضغط ENTER;</li> <li>يجب أن يتم تحميل الموقع؛ إذا لم يتم تحميل الموقع لأي سبب، انتظر للحظة وحاول مرة أخرى.</li> </ol> <p>إذا كان لديك أية مشكلات أثناء عملية التثبيت أو استخدام متصفح Tor، يُرجى زيارة <a href="https://www.youtube.com/results?search_query=Install+Tor+Browser+Windows" target="_blank">https://www.youtube.com</a> واكتب الطلب "install tor browser windows" أو "تثبيت نوافذ متصفح Tor" في شريط البحث، وسوف تجد الكثير من أشرطة الفيديو للتدريب حول تثبيت متصفح Tor واستخدامه.</p> <hr> <p><strong>معلومات إضافية:</strong></p> <p>سوف تجد إرشادات استعادة الملفات الخاصة بك ("*.hta") في أي مجلد مع ملفاتك المشفرة.</p> <p>الإرشادات ("*.hta") الموجودة في المجلدات مع ملفاتك المشفرة ليست فيروسات والإرشادات ("*.hta") سوف تساعدك على فك تشفير الملفات الخاصة بك.</p> <p>تذكر أن أسوأ موقف قد حدث بالفعل، والآن مستقبل ملفاتك يعتمد على عزيمتك وسرعة الإجراءات الخاصة بك.</p> </div> <div id="zh"> <p>您找不到所需的文件?<br>您文件的内容无法阅读?</p> <p>这是正常的,因为您文件的文件名和数据已经被“Cerber&nbsp;Ransomware”加密了。</p> <p>这意味着您的文件并没有损坏!您的文件只是被修改了,这个修改是可逆的,解密之前您无法使用您的文件。</p> <p>安全解密您文件的唯一方式是购买特别的解密软件“Cerber&nbsp;Decryptor”。</p> <p>任何使用第三方软件恢复您文件的方式对您的文件来说都将是致命的!</p> <hr> <p>您可以在您的个人页面上购买解密软件:</p> <p><span class="info"><span class="updating">请稍候...</span><a class="url" href="http://ffoqr3ug7m726zou.od3rag.top/9919-3BBE-CBC8-0073-53BE" target="_blank">http://ffoqr3ug7m726zou.od3rag.top/9919-3BBE-CBC8-0073-53BE</a><span class="hr"></span><a href="http://ffoqr3ug7m726zou.3pxhgt.top/9919-3BBE-CBC8-0073-53BE" target="_blank">http://ffoqr3ug7m726zou.3pxhgt.top/9919-3BBE-CBC8-0073-53BE</a><span class="hr"></span><a href="http://ffoqr3ug7m726zou.onion.to/9919-3BBE-CBC8-0073-53BE" target="_blank">http://ffoqr3ug7m726zou.onion.to/9919-3BBE-CBC8-0073-53BE</a></span></p> <p>如果这个页面无法打开,请 <span class="button" onclick="return updateUrl();">点击这里</span> 生成您个人页面的新地址。</p> <p>您将在这个页面上看到如何购买解密软件以恢复您的文件。</p> <p>您可以在这个页面使用“Cerber&nbsp;Decryptor”免费恢复任何文件。</p> <hr> <p>如果您的个人页面长期不可用,有其他方法可以打开您的个人页面 - 安装并使用 Tor 浏览器:</p> <ol> <li>使用您的上网浏览器(如果您不知道使用 Internet&nbsp;Explorer 的话);</li> <li>在浏览器的地址栏输入或复制地址 <a href="https://www.torproject.org/download/download-easy.html.en" target="_blank">https://www.torproject.org/download/download-easy.html.en</a> 并按 ENTER 键;</li> <li>等待站点加载;</li> <li>您将在站点上下载 Tor 浏览器;下载并运行它,按照安装指南进行操作,等待直至安装完成;</li> <li>运行 Tor 浏览器;</li> <li>使用“Connect”按钮进行连接(如果您使用英文版);</li> <li>初始化之后将打开正常的上网浏览器窗口;</li> <li>在浏览器地址栏中输入或复制地址 <br><span class="info">http://ffoqr3ug7m726zou.onion/9919-3BBE-CBC8-0073-53BE</span><br></li> <li>按 ENTER 键;</li> <li>该站点将加载;如果由于某些原因等待一会儿后没有加载,请重试。</li> </ol> <p>如果在安装期间或使用 Tor 浏览器期间有任何问题,请访问 <a href="https://www.baidu.com/s?wd=%E6%80%8E%E4%B9%88%E5%AE%89%E8%A3%85%20tor%20%E6%B5%8F%E8%A7%88%E5%99%A8" target="_blank">https://www.baidu.com</a> 并在搜索栏中输入“怎么安装 Tor 浏览器”,您将找到有关如何安装洋葱 Tor 浏览器的说明和教程。</p> <hr> <p><strong>附加信息:</strong></p> <p>您将在任何带有加密文件的文件夹中找到恢复您文件(“*.hta”)的说明。</p> <p>带有加密文件的文件夹中的(“*.hta”)说明不是病毒,(“*.hta”)说明将帮助您解密您的文件。</p> <p>请记住,最坏的情况都发生过了,您的文件还能不能用取决于您的决定和反应速度。</p> </div> <div id="nl"> <p>Kunt u de nodige files niet vinden?<br>Is de inhoud van uw bestanden niet leesbaar?</p> <p>Het is gewoonlijk omdat de bestandsnamen en de gegevens in uw bestanden zijn versleuteld door “Cerber&nbsp;Ransomware”.</p> <p>Het betekent dat uw bestanden NIET beschadigd zijn! Uw bestanden zijn alleen gewijzigd. Deze wijziging is omkeerbaar. Vanaf nu is het niet mogelijk uw bestanden te gebruiken totdat ze ontsleuteld zijn.</p> <p>De enige manier om uw bestanden veilig te

Extracted

Path

C:\Users\Public\Recorded TV\_R_E_A_D___T_H_I_S___ZOP1Q_.txt

Family

cerber

Ransom Note
Hi, I'am CRBR ENCRYPTOR ;) ----- YOUR DOCUMENTS, PHOTOS, DATABASES AND OTHER IMPORTANT FILES HAVE BEEN ENCRYPTED! ----- The only one way to decrypt your files is to receive the private key and decryption program. To receive the private key and decryption program go to any decrypted folder, inside there is the special file (*_R_E_A_D___T_H_I_S_*) with complete instructions how to decrypt your files. If you cannot find any (*_R_E_A_D___T_H_I_S_*) file at your PC, follow the instructions below: ----- 1. Download "Tor Browser" from https://www.torproject.org/ and install it. 2. In the "Tor Browser" open your personal page here: http://xpcx6erilkjced3j.onion/7035-0219-FB58-0098-952F Note! This page is available via "Tor Browser" only. ----- Also you can use temporary addresses on your personal page without using "Tor Browser". ----- 1. http://xpcx6erilkjced3j.17gcun.top/7035-0219-FB58-0098-952F 2. http://xpcx6erilkjced3j.1ebjjq.top/7035-0219-FB58-0098-952F 3. http://xpcx6erilkjced3j.15ezkm.top/7035-0219-FB58-0098-952F 4. http://xpcx6erilkjced3j.1mfmkz.top/7035-0219-FB58-0098-952F 5. http://xpcx6erilkjced3j.1jmu65.top/7035-0219-FB58-0098-952F ----- Note! These are temporary addresses! They will be available for a limited amount of time! -----
URLs

http://xpcx6erilkjced3j.onion/7035-0219-FB58-0098-952F

http://xpcx6erilkjced3j.17gcun.top/7035-0219-FB58-0098-952F

http://xpcx6erilkjced3j.1ebjjq.top/7035-0219-FB58-0098-952F

http://xpcx6erilkjced3j.15ezkm.top/7035-0219-FB58-0098-952F

http://xpcx6erilkjced3j.1mfmkz.top/7035-0219-FB58-0098-952F

http://xpcx6erilkjced3j.1jmu65.top/7035-0219-FB58-0098-952F

Targets

    • Target

      RNSM00294.7z

    • Size

      18.3MB

    • MD5

      35f36146d16e76854de00c15cd264590

    • SHA1

      9b9cbc5a04440a9e6f677bbced1ba1c87b3fa77f

    • SHA256

      ac2e8a7e7efa633d42c18b4fb526aca8a64730f647bd31ee6dc739092051c837

    • SHA512

      d17ade4aa19156b185655a33e9645ab0f1762558e8c0ddd441b23c931755ea0c21893a7e5446b8bbe27c504d0f355c556777e0400aba318e24d5ca9c472a837c

    • SSDEEP

      393216:SBqZJmSJMZd5kVWyO7fIFmgUh1dAnA3cIDbfXGJ8o7hnvHEYML05Ei:ScZP+ZrHyOTknUh1dIkjXGmShnBML4B

    • Cerber

      Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.

    • Cerber family

    • Detected Xorist Ransomware

    • Locky

      Ransomware strain released in 2016, with advanced features like anti-analysis.

    • Locky family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Xorist Ransomware

      Xorist is a ransomware first seen in 2020.

    • Xorist family

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (1496) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Clears Network RDP Connection History and Configurations

      Remove evidence of malicious network connections to clean up operations traces.

    • Contacts a large (1646) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Modifies Windows Firewall

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops desktop.ini file(s)

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks