Overview
overview
10Static
static
3Ransomware-master.zip
windows7-x64
3Ransomware-master.zip
windows10-2004-x64
1Ransomware...ICENSE
windows7-x64
1Ransomware...ICENSE
windows10-2004-x64
1Ransomware...DME.md
windows7-x64
3Ransomware...DME.md
windows10-2004-x64
3Ransomware...omware
windows7-x64
1Ransomware...omware
windows10-2004-x64
1Ransomware...er.zip
windows7-x64
1Ransomware...er.zip
windows10-2004-x64
10cerber.exe
windows7-x64
10cerber.exe
windows10-2004-x64
10Ransomware...ll.zip
windows7-x64
1Ransomware...ll.zip
windows10-2004-x64
1cryptowall.exe
windows7-x64
9cryptowall.exe
windows10-2004-x64
3Ransomware...aw.zip
windows7-x64
1Ransomware...aw.zip
windows10-2004-x64
1jigsaw.exe
windows7-x64
10jigsaw.exe
windows10-2004-x64
10Ransomware...ky.zip
windows7-x64
1Ransomware...ky.zip
windows10-2004-x64
1Locky.exe
windows7-x64
10Locky.exe
windows10-2004-x64
10Ransomware...ba.zip
windows7-x64
1Ransomware...ba.zip
windows10-2004-x64
1131.exe
windows7-x64
1131.exe
windows10-2004-x64
3Ransomware...nu.zip
windows7-x64
1Ransomware...nu.zip
windows10-2004-x64
1Matsnu-MBR...3 .exe
windows7-x64
7Matsnu-MBR...3 .exe
windows10-2004-x64
3General
-
Target
Ransomware-master.zip
-
Size
12.9MB
-
Sample
241128-2g47satjfy
-
MD5
255ffabf0788a28c52889e9f9675c9dc
-
SHA1
4c61f9e16df1705db48ee91ec1a2ab3d84e2f107
-
SHA256
3e2ba9a25e9891c6dcb75ad73c1262d523e09f0eb3d095ede9ea9d11f42ebc28
-
SHA512
ccfbf169a47f7bcb653fa04b0b0b10762a594a703eae14f56bb6e0bb2e3ab0b7ee4b3a2c14ade7ee6509fcabfed1a5a4da2e7bf035295e797eba8140079eef3d
-
SSDEEP
393216:CMa/Yi2nfFSrjISVemu/GyBSFb+JYSWTmZ:CMaUnnlmk+bDSWs
Static task
static1
Behavioral task
behavioral1
Sample
Ransomware-master.zip
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Ransomware-master.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Ransomware-master/LICENSE
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
Ransomware-master/LICENSE
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Ransomware-master/README.md
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Ransomware-master/README.md
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Ransomware-master/Ransomware
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Ransomware-master/Ransomware
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Ransomware-master/etc/Ransomware.Cerber.zip
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Ransomware-master/etc/Ransomware.Cerber.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
cerber.exe
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
cerber.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Ransomware-master/etc/Ransomware.Cryptowall.zip
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Ransomware-master/etc/Ransomware.Cryptowall.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
cryptowall.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
cryptowall.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Ransomware-master/etc/Ransomware.Jigsaw.zip
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Ransomware-master/etc/Ransomware.Jigsaw.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
jigsaw.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
jigsaw.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Ransomware-master/etc/Ransomware.Locky.zip
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Ransomware-master/etc/Ransomware.Locky.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Locky.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Locky.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Ransomware-master/etc/Ransomware.Mamba.zip
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Ransomware-master/etc/Ransomware.Mamba.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
131.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
131.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Ransomware-master/etc/Ransomware.Matsnu.zip
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Ransomware-master/etc/Ransomware.Matsnu.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_R_E_A_D___T_H_I_S___HLWGHXN_.txt
cerber
http://p27dokhpz2n7nvgr.onion/3342-3B4A-67AB-0446-9BE4
http://p27dokhpz2n7nvgr.12hygy.top/3342-3B4A-67AB-0446-9BE4
http://p27dokhpz2n7nvgr.14ewqv.top/3342-3B4A-67AB-0446-9BE4
http://p27dokhpz2n7nvgr.14vvrc.top/3342-3B4A-67AB-0446-9BE4
http://p27dokhpz2n7nvgr.129p1t.top/3342-3B4A-67AB-0446-9BE4
http://p27dokhpz2n7nvgr.1apgrn.top/3342-3B4A-67AB-0446-9BE4
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_R_E_A_D___T_H_I_S___YPI8B5A6_.hta
cerber
Extracted
C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___9OUB2_.txt
cerber
http://p27dokhpz2n7nvgr.onion/890C-6CD1-CD40-0446-9828
http://p27dokhpz2n7nvgr.12hygy.top/890C-6CD1-CD40-0446-9828
http://p27dokhpz2n7nvgr.14ewqv.top/890C-6CD1-CD40-0446-9828
http://p27dokhpz2n7nvgr.14vvrc.top/890C-6CD1-CD40-0446-9828
http://p27dokhpz2n7nvgr.129p1t.top/890C-6CD1-CD40-0446-9828
http://p27dokhpz2n7nvgr.1apgrn.top/890C-6CD1-CD40-0446-9828
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_R_E_A_D___T_H_I_S___K65C14I_.txt
cerber
http://p27dokhpz2n7nvgr.onion/08D1-4FCF-28B7-0446-9677
http://p27dokhpz2n7nvgr.12hygy.top/08D1-4FCF-28B7-0446-9677
http://p27dokhpz2n7nvgr.14ewqv.top/08D1-4FCF-28B7-0446-9677
http://p27dokhpz2n7nvgr.14vvrc.top/08D1-4FCF-28B7-0446-9677
http://p27dokhpz2n7nvgr.129p1t.top/08D1-4FCF-28B7-0446-9677
http://p27dokhpz2n7nvgr.1apgrn.top/08D1-4FCF-28B7-0446-9677
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_R_E_A_D___T_H_I_S___A2QQC8GU_.hta
cerber
Targets
-
-
Target
Ransomware-master.zip
-
Size
12.9MB
-
MD5
255ffabf0788a28c52889e9f9675c9dc
-
SHA1
4c61f9e16df1705db48ee91ec1a2ab3d84e2f107
-
SHA256
3e2ba9a25e9891c6dcb75ad73c1262d523e09f0eb3d095ede9ea9d11f42ebc28
-
SHA512
ccfbf169a47f7bcb653fa04b0b0b10762a594a703eae14f56bb6e0bb2e3ab0b7ee4b3a2c14ade7ee6509fcabfed1a5a4da2e7bf035295e797eba8140079eef3d
-
SSDEEP
393216:CMa/Yi2nfFSrjISVemu/GyBSFb+JYSWTmZ:CMaUnnlmk+bDSWs
Score3/10 -
-
-
Target
Ransomware-master/LICENSE
-
Size
1KB
-
MD5
a31887cbb9ee63d417035c0c01213070
-
SHA1
6beb39510e95e12f4f0426999fdb652c7742252b
-
SHA256
13d93567d2d97b99868b6f263fe00f425aa95007d30297c3c55c685bde51d460
-
SHA512
77e75fd7038201b602da56e86d2fff9eea22f1e703fee34f35fde0e6e3bb8434bd9b939db6853068d54fdb46182800e7638850a396a409dad83c3ecbc17bfb75
Score1/10 -
-
-
Target
Ransomware-master/README.md
-
Size
2KB
-
MD5
7c9e68a76f5c9e48acd35736ba051eda
-
SHA1
865576e3954e1857b99705e1d723a32c364da71f
-
SHA256
b9e98484ced89ad580eaf9e94f9c9499aa58d56e1f1efa0b78b0cf8ea9c17c86
-
SHA512
61e7c188e17b348d9a0871f0e506c12592a9fd459e27b7a42aae95ce4a2fc523524ae29b90c56b9e68c8055257b72e13b921cfc62b2c76a878abbb402bfc8957
Score3/10 -
-
-
Target
Ransomware-master/Ransomware
-
Size
25KB
-
MD5
d54b447020c50a74fefeeacd7be46733
-
SHA1
96f347b8545bde22d52e36d95779dceff0401697
-
SHA256
d1ebf588dbbcca6b21d20ef37d368d48bf6d7a9cdb6636245010fe87e4533f70
-
SHA512
415825c912210b5115dab8f2388631120eab7ee98bd7cba04705b700d10e325e1b42b6f8dbe5ff37a3b411a203ae436915d4dd6b655750f354817382d31f0954
-
SSDEEP
384:7B866666r66666966666EVGWml1VZAs9SX9BO9:7BUGWml1VZAs9Sm9
Score1/10 -
-
-
Target
Ransomware-master/etc/Ransomware.Cerber.zip
-
Size
215KB
-
MD5
5c571c69dd75c30f95fe280ca6c624e9
-
SHA1
b0610fc5d35478c4b95c450b66d2305155776b56
-
SHA256
416774bf62d9612d11d561d7e13203a3cbc352382a8e382ade3332e3077e096c
-
SHA512
8e7b9a4a514506d9b8e0f50cc521f82b5816d4d9c27da65e4245e925ec74ac8f93f8fe006acbab5fcfd4970573b11d7ea049cc79fb14ad12a3ab6383a1c200b2
-
SSDEEP
3072:EJk9kcytz1Qg4kViSMoq9OsLvz8L5HINY8lYdeIX8woWJQHr6LqK2fU0MwL0b06R:EUkcyVlDq8rIblYomoWnvfp0g
-
Cerber family
-
Contacts a large (1100) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
-
-
Target
cerber.exe
-
Size
604KB
-
MD5
8b6bc16fd137c09a08b02bbe1bb7d670
-
SHA1
c69a0f6c6f809c01db92ca658fcf1b643391a2b7
-
SHA256
e67834d1e8b38ec5864cfa101b140aeaba8f1900a6e269e6a94c90fcbfe56678
-
SHA512
b53d2cc0fe5fa52262ace9f6e6ea3f5ce84935009822a3394bfe49c4d15dfeaa96bfe10ce77ffa93dbf81e5428122aa739a94bc709f203bc346597004fd75a24
-
SSDEEP
6144:yYghlI5/u8f1mr+4RJ99MpDa52RX5wRDhOOU0qsR:yYKlYmDXEpDHRXP01
-
Cerber family
-
Blocklisted process makes network request
-
Contacts a large (1096) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
-
-
Target
Ransomware-master/etc/Ransomware.Cryptowall.zip
-
Size
100KB
-
MD5
8710ea46c2db18965a3f13c5fb7c5be8
-
SHA1
24978c79b5b4b3796adceffe06a3a39b33dda41d
-
SHA256
60d574055ae164cc32df9e5c9402deefa9d07e5034328d7b41457d35b7312a0e
-
SHA512
c71de7a60e7edeedbdd7843a868b6f5a95f2718f0f35d274cf85951ee565ef3ba1e087881f12aeede686ce6d016f3fd533b7ef21d878a03d2455acc161abf583
-
SSDEEP
3072:OCDc19avf1fHqOhdzVD/9Ae7RT5f6IiL+WfXS21o4D:OCD0QvlqGRlAlX+sXjo4D
Score1/10 -
-
-
Target
cryptowall.bin
-
Size
240KB
-
MD5
47363b94cee907e2b8926c1be61150c7
-
SHA1
ca963033b9a285b8cd0044df38146a932c838071
-
SHA256
45317968759d3e37282ceb75149f627d648534c5b4685f6da3966d8f6fca662d
-
SHA512
93dfaafc183360829448887a112dd49c90ec5fe50dcd7c7bbc06c1c8daa206eeea5577f726d906446322c731d0520e93700d5ff9cefd730fba347c72b7325068
-
SSDEEP
3072:xkeyloECBch6ZCGBGSmHJ0y5lj6jdojK7+MGOXpXx8z3Lp7Yoq:xGlnCIwMpj6ijKfxx8z3F0V
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
-
-
Target
Ransomware-master/etc/Ransomware.Jigsaw.zip
-
Size
239KB
-
MD5
3ad6374a3558149d09d74e6af72344e3
-
SHA1
e7be9f22578027fc0b6ddb94c09b245ee8ce1620
-
SHA256
86a391fe7a237f4f17846c53d71e45820411d1a9a6e0c16f22a11ebc491ff9ff
-
SHA512
21c21b36be200a195bfa648e228c64e52262b06d19d294446b8a544ff1d81f81eb2af74ddbdebc59915168db5dba76d0f0585e83471801d9ee37e59af0620720
-
SSDEEP
3072:p7ykj3uuY4NsJD7kPdSRQLqas/pkPm9jvkEL60Uf7k2BgS6/aFybrNN5ZAdNstk7:p7ym3VNA7w8R5/rxv7O0yng0UtVw5NJ
Score1/10 -
-
-
Target
jigsaw
-
Size
283KB
-
MD5
2773e3dc59472296cb0024ba7715a64e
-
SHA1
27d99fbca067f478bb91cdbcb92f13a828b00859
-
SHA256
3ae96f73d805e1d3995253db4d910300d8442ea603737a1428b613061e7f61e7
-
SHA512
6ef530b209f8ec459cca66dbf2c31ec96c5f7d609f17fa3b877d276968032fbc6132ea4a45ed1450fb6c5d730a7c9349bf4481e28befaea6b119ec0ded842262
-
SSDEEP
6144:7fukPLPvucHiQQQ4uuy9ApZbZWxcZt+kTfMLJTOAZiYSXjjeqXus:7fu5cCT7yYlWi8kTfMLJTOAZiYSXjyqX
Score10/10-
Jigsaw Ransomware
Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.
-
Jigsaw family
-
Renames multiple (2002) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
Ransomware-master/etc/Ransomware.Locky.zip
-
Size
125KB
-
MD5
b265305541dce2a140da7802442fbac4
-
SHA1
63d0b780954a2bc96b3a77d9a2b3369d865bf1fd
-
SHA256
0537fa38b88755f39df1cd774b907ec759dacab2388dc0109f4db9f0e9d191a0
-
SHA512
af65384f814633fe1cde8bf4a3a1a8f083c7f5f0b7f105d47f3324cd2a8c9184ccf13cb3e43b47473d52f39f4151e7a9da1e9a16868da50abb74fcbc47724282
-
SSDEEP
1536:6mXbzYYlSESr+LdgbfzNTBstcc6yVeHuwuY5pzl5Lypx0DIY6KQOoTFKmN9YMKW8:dbSr+Jg7lB2cV1aQ+WQVTFX9YPGQi1Mf
Score1/10 -
-
-
Target
Locky
-
Size
180KB
-
MD5
b06d9dd17c69ed2ae75d9e40b2631b42
-
SHA1
b606aaa402bfe4a15ef80165e964d384f25564e4
-
SHA256
bc98c8b22461a2c2631b2feec399208fdc4ecd1cd2229066c2f385caa958daa3
-
SHA512
8e54aca4feb51611142c1f2bf303200113604013c2603eea22d72d00297cb1cb40a2ef11f5129989cd14f90e495db79bffd15bd6282ff564c4af7975b1610c1c
-
SSDEEP
3072:gzWgfLlUc7CIJ1tkZaQyjhOosc8MKi6KDXnLCtyAR0u1cZ86:gdLl4wkZa/UDiD7ukst1H6
Score10/10-
Locky family
-
-
-
Target
Ransomware-master/etc/Ransomware.Mamba.zip
-
Size
1.0MB
-
MD5
f94d1f4e2ce6c7cc81961361aab8a144
-
SHA1
88189db0691667653fe1522c6b5673bf75aa44aa
-
SHA256
610a52c340ebaff31093c5ef0d76032ac2acdc81a3431e68b244bf42905fd70a
-
SHA512
7b7cf9a782549e75f87b8c62d091369b47c1b22c9a10dcf4a5d9f2db9a879ed3969316292d3944f95aeb67f34ae6dc6bbe2ae5ca497be3a25741a2aa204e66ad
-
SSDEEP
24576:Uy0yC/fh9Dnt24GZrEXdjl3Fha3fXUkWpfnb:CyGf7TtCZrOll1svX0fb
Score1/10 -
-
-
Target
131.exe
-
Size
2.3MB
-
MD5
409d80bb94645fbc4a1fa61c07806883
-
SHA1
4080bb3a28c2946fd9b72f6b51fe15de74cbb1e1
-
SHA256
2ecc525177ed52c74ddaaacd47ad513450e85c01f2616bf179be5b576164bf63
-
SHA512
a99a2f17d9fbb1da9fb993b976df63afa74317666eca46d1f04e7e6e24149547d1ac7210f673caeae9b23a900528ad6ad0a7b98780eff458d3d505029a06e9ba
-
SSDEEP
49152:XM16E7qUoM5NWX7DP+1egOhcraQzK6j97V:c16/rM5oW1ZrRz
Score3/10 -
-
-
Target
Ransomware-master/etc/Ransomware.Matsnu.zip
-
Size
62KB
-
MD5
0a3487070911228115f3a13e9da2cb89
-
SHA1
c2d57c288bc9951dee4cc289d15e18158ef3f725
-
SHA256
f73027dd665772cc94dbe22b15938260be61cbaad753efdccb61c4fa464645e0
-
SHA512
996f839d347d8983e01e6e94d2feb48f2308ab7410c6743a72b7ecff15b34a30cd12a5764c0470c77138cf8724d5641d03dd81793e28d47fe597f315e116fa77
-
SSDEEP
1536:Wtmvcv25VrNQnc+6KmmjnFcqbq6eXq8GPHTDAY:WBUNQnc+6Vmmv6e8fP
Score1/10 -
-
-
Target
Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .com_
-
Size
102KB
-
MD5
1b2d2a4b97c7c2727d571bbf9376f54f
-
SHA1
1fc29938ec5c209ba900247d2919069b320d33b0
-
SHA256
7634433f8fcf4d13fb46d680802e48eeb160e0f51e228cae058436845976381e
-
SHA512
506fc96423e5e2e38078806591e09a6eb3cf924eb748af528f7315aa0b929890823798a3ef2a5809c14023c3ff8a3db36277bc90c7b099218422aafa4e0c2ee0
-
SSDEEP
1536:jj+Rj1lGIXKSmE17v97yiqHGMRPtbsLW8/V2k12v1/BDxVyCfCrCAc:jjw6Sf0iqmMnb2W02v3mCf4Nc
Score7/10-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Direct Volume Access
1Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
2File Deletion
2Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1