General

  • Target

    BlackCat(ALPHV)_pw_infected.zip

  • Size

    1.6MB

  • Sample

    241119-m7anjavdnd

  • MD5

    cc4ce6b2e43d4281de9d4b3f8d119563

  • SHA1

    46f3c65451a31a95831fc398eb71b2f996ce1363

  • SHA256

    ab6053417ad8ead3a16c778a7828085635abef9ed9b45ceaf04ff973b448d17d

  • SHA512

    c4fd5c7aa9bd44fc57197b474e358f915cd0dc707f3571b95ba16403d476c803ddaecee021f80d9ffa8fc8a93b829503745fa9fc198d46d7fb01fd480445feae

  • SSDEEP

    24576:XpQQ1fGbxeB2yJHrZJzbBvmeayeoUyXrv+ChgEG0d5ggpyit26Nf794fWTtrO/4i:Z1WydzRmnoUyXXE0PgCTt26d79LdOgk/

Malware Config

Extracted

Family

blackcat

Credentials
  • Username:
    CEKOK\comodo
  • Password:
    Ngn2016!
Attributes
  • enable_network_discovery

    true

  • enable_self_propagation

    true

  • enable_set_wallpaper

    true

  • extension

    b5o8ph3

  • note_file_name

    RECOVER-${EXTENSION}-FILES.txt

  • note_full_text

    >> What happened? Important files on your network was ENCRYPTED and now they have "${EXTENSION}" extension. In order to recover your files you need to follow instructions below. >> CAUTION DO NOT MODIFY ENCRYPTED FILES YOURSELF. DO NOT USE THIRD PARTY SOFTWARE TO RESTORE YOUR DATA. YOU MAY DAMAGE YOUR FILES, IT WILL RESULT IN PERMANENT DATA LOSS. >> What should I do next? Follow these simple steps to get everything back to normal: 1) Download and install Tor Browser from: https://torproject.org/ 2) Navigate to: http://aoczppoxmfqqthtwlwi4fmzlrv6aor3isn6ffaiic55wrfumxslx3vyd.onion/?access-key=${ACCESS_KEY}

rsa_pubkey.plain

Targets

    • Target

      BlackCat(ALPHV)_pw_infected.zip

    • Size

      1.6MB

    • MD5

      cc4ce6b2e43d4281de9d4b3f8d119563

    • SHA1

      46f3c65451a31a95831fc398eb71b2f996ce1363

    • SHA256

      ab6053417ad8ead3a16c778a7828085635abef9ed9b45ceaf04ff973b448d17d

    • SHA512

      c4fd5c7aa9bd44fc57197b474e358f915cd0dc707f3571b95ba16403d476c803ddaecee021f80d9ffa8fc8a93b829503745fa9fc198d46d7fb01fd480445feae

    • SSDEEP

      24576:XpQQ1fGbxeB2yJHrZJzbBvmeayeoUyXrv+ChgEG0d5ggpyit26Nf794fWTtrO/4i:Z1WydzRmnoUyXXE0PgCTt26d79LdOgk/

    • BlackCat

      A Rust-based ransomware sold as RaaS first seen in late 2021.

    • Blackcat family

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks