General

  • Target

    20e0e61d27762a524f6974fb9f4995062582db351d5576e62a214d6b5e5808e7.zip

  • Size

    713KB

  • Sample

    241122-yrnq1atmdm

  • MD5

    89a3a136e0da04b17d4d4bc5083b8dba

  • SHA1

    45a5f20efd84021c671ee6e60df25beb0f7ccd9e

  • SHA256

    a45521c95509806c08349879204a166b8358f165b4189e6ba810491568ed2d29

  • SHA512

    ecbd3f1134dab7a63ac1bbe46f505d97aed5d331050ef13134c0aaf51bcb7341438e082f4dccd1a1462bfe86743e8d3c15d9ab85390bae4f732f85e8f5a2723e

  • SSDEEP

    12288:Rsavw5eXyO88ul7iOW7XTBEs7VIJMzWncAKTPGZ6W6VzI+cm2edFEf7zrxZEa45P:zw5A7u1iOW7TasO+gjKTMh6VXv2edSVA

Malware Config

Extracted

Path

/usr/sbin/RECOVERY INFO.txt

Ransom Note
Your data has been encrypted In order to return your files back you need decryption tool 1)Download TOR Browser 2)Open in TOR browser link below and contact with us there: http://weaxorpemwzoxg5cdvvfd77p3qczkxqii37ww4foo2n4jcft3mytbpyd.onion/lsaHqOhaJLOyrWSPvtJajdzqrftqzOlt/C8C93634D8B19BE4FE221FDE41C180431DFB7200F6426B11C5A95B77AF263DB5 Or email: [email protected] Limit for free decryption: 3 files up to 5mb (no database or backups)
URLs

http://weaxorpemwzoxg5cdvvfd77p3qczkxqii37ww4foo2n4jcft3mytbpyd.onion/lsaHqOhaJLOyrWSPvtJajdzqrftqzOlt/C8C93634D8B19BE4FE221FDE41C180431DFB7200F6426B11C5A95B77AF263DB5

Targets

    • Target

      20e0e61d27762a524f6974fb9f4995062582db351d5576e62a214d6b5e5808e7/20e0e61d27762a524f6974fb9f4995062582db351d5576e62a214d6b5e5808e7.elf

    • Size

      1.7MB

    • MD5

      503c35c37d00d04ff2793c2b4bf5038f

    • SHA1

      a03a9d06ca8441cb2ec7fe0c49cb56023130d884

    • SHA256

      20e0e61d27762a524f6974fb9f4995062582db351d5576e62a214d6b5e5808e7

    • SHA512

      c653fd4f8a6724b9a25e24e9a2a0152340be294d4d53d82e5762fd8599b014dabc4be6a2830822d51ce744ef256f1e5fe78b5c016fc24907de7ea964fb5835ee

    • SSDEEP

      24576:94GdIhU6rF5IF0pGVZa4B6dmyw5DQ7EQ6LPni2Mt+aa:XShUL7VZ1BYZw5DcRt+a

    • Renames multiple (107) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Adds new SSH keys

      Linux special file to hold SSH keys. The threat actor may add new keys for further remote access.

    • Creates/modifies environment variables

      Creating/modifying environment variables is a common persistence mechanism.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Writes file to system bin folder

    • Modifies Bash startup script

MITRE ATT&CK Enterprise v15

Tasks