Resubmissions

05-02-2025 10:30

250205-mj94gstpgl 10

05-02-2025 10:30

250205-mjtfqssmgt 10

25-05-2022 22:49

220525-2rm19aefd9 10

General

  • Target

    sample-604995-339165f63aec8d7fd7798129d0fc68ad.zip

  • Size

    229KB

  • Sample

    250205-mj94gstpgl

  • MD5

    84d2df993ecc1d772411758180a426db

  • SHA1

    323f84604434cd4f120e1b938aa113e7dff5106b

  • SHA256

    8880aa3c00150fb4a6745b59b33c71dd6246b61309e81a15d8f6350616adfbd9

  • SHA512

    8675e1e4471dfc23b02351b918ac0993e0c1cecde53e6fb70f3816f0b93fec88f6988e965c51bd9f7b8fbc1620f36bf91ae296c1bcc8680e53099d99604a7b4f

  • SSDEEP

    6144:bGdyBIiDhMHtnawJTmewBqXAqoMGpzKh9:bU6IiatawJTmeI4AqoD69

Malware Config

Extracted

Family

mespinoza

Attributes
  • ransomnote

    Hi Company, Every byte on any types of your devices was encrypted. Don't try to use backups because it were encrypted too. To get all your data back contact us: [email protected] [email protected] -------------- FAQ: 1. Q: How can I make sure you don't fooling me? A: You can send us 2 files(max 2mb). 2. Q: What to do to get all data back? A: Don't restart the computer, don't move files and write us. 3. Q: What to tell my boss? A: Protect Your System Amigo.

Extracted

Path

C:\Users\Readme.README

Ransom Note
Hi Company, Every byte on any types of your devices was encrypted. Don't try to use backups because it were encrypted too. To get all your data back contact us: [email protected] [email protected] -------------- FAQ: 1. Q: How can I make sure you don't fooling me? A: You can send us 2 files(max 2mb). 2. Q: What to do to get all data back? A: Don't restart the computer, don't move files and write us. 3. Q: What to tell my boss? A: Protect Your System Amigo.

Targets

    • Target

      sample-604995-339165f63aec8d7fd7798129d0fc68ad.zip

    • Size

      229KB

    • MD5

      84d2df993ecc1d772411758180a426db

    • SHA1

      323f84604434cd4f120e1b938aa113e7dff5106b

    • SHA256

      8880aa3c00150fb4a6745b59b33c71dd6246b61309e81a15d8f6350616adfbd9

    • SHA512

      8675e1e4471dfc23b02351b918ac0993e0c1cecde53e6fb70f3816f0b93fec88f6988e965c51bd9f7b8fbc1620f36bf91ae296c1bcc8680e53099d99604a7b4f

    • SSDEEP

      6144:bGdyBIiDhMHtnawJTmewBqXAqoMGpzKh9:bU6IiatawJTmeI4AqoD69

    Score
    3/10
    • Target

      W71my1HtQm.exe

    • Size

      499KB

    • MD5

      339165f63aec8d7fd7798129d0fc68ad

    • SHA1

      07f594333ca9db110bbee37a9643988f4cc22933

    • SHA256

      0f0014669bc10a7d87472cafc05301c66516857607b920ddeb3039f4cb8f0a50

    • SHA512

      5ef9dbe0f29397adf00f0c4ace8f90fd0aba9a0c2016cecff02f68bcef5781bc5dcd32c18d9b54cc8025581ec6494990dd472cdd36c394637799907e5cc55e3b

    • SSDEEP

      12288:WLIv9fm79P+OeO+OeNhBBhhBBmBRW3aHhIBidMbDI8s9eJ:EIv9OxBRW3+hIIdE01e

    • Mespinoza Ransomware

      Also known as Pysa. Ransomware-as-a-servoce which first appeared in 2020.

    • Mespinoza family

    • Renames multiple (2725) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks