General

  • Target

    2025-03-06_6c2b5d1e5204f83e16265da3600d48e0_ryuk

  • Size

    1.3MB

  • Sample

    250306-cnpcgawlx6

  • MD5

    6c2b5d1e5204f83e16265da3600d48e0

  • SHA1

    dc40c80e3444ca688779cd81a2b93964fa909b89

  • SHA256

    805cb28b3e595afe97a6e4ac5051ca11b34d72f4dff2af4581cf74a6b126af43

  • SHA512

    5d2eb6e70eda83e491bbc993eec57c35245a9340f6526e6e0abad3c1ebe0c3457e0efc5c6012463ece384de771bb76b3e3f0cf8357a8e71f7c7ac18d66af4e78

  • SSDEEP

    24576:rdtwbXPGBkNXi/Z479uN0/XuNRMLDy5VURkmqpK1Oshy1ZT2rpo3NahUXz+xRE3n:rxLyEuPFvN/a

Malware Config

Extracted

Path

C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\SURTR_README.hta

Family

surtr

Ransom Note
SurtrRansomware OOPS ALL YOUR IMPORTANT FILES HAVE BEEN ENCRYPTED AND STOLEN !! Notice : There is only one way to restore your data read the boxes carefully! Attention : Do Not change file names. Do Not try to decrypt using third party softwares , it may cause permanent data loss . your files will be sold on the Dark Web after 15 days. Imagine 1 million hackers have all your information including files, IP, name and number and location and ... Do not pay any money before decrypting the test files. You can use our 50% discount if you pay the fee within first 15 days of encryption . otherwise the price will be doubled. In order to warranty you , our team will decrypt 3 of your desired files for free.but you need to pay the specified price for the rest of the operation . How To Decrypt : Your system is offline . in order to contact us you can email this address [email protected] use this ID (tgOZOYx3gur9jx) for the title of your email . If you weren't able to contact us within 24 hours please email : [email protected] If you didn't get any respond within 48 hours use this link (Not Available Now).send your ID and your cryptor name (SurtrRansomwareUserName) therefore we can create another way to contact you as soon as possible

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\SURTR_README.hta

Ransom Note
<!DOCTYPE html><html lang="en"> <head> <meta http-equiv="x-ua-compatible" content="ie = 9"> <meta name="viewport" content="width = device-width, initial-scale = 1.0"> <title>SurtrRansomware</title> <HTA:APPLICATION ID="SurtrRansomware" APPLICATIONNAME="SurtrRansomware" icon=explorer.exe scroll=no contextmenu=no innerBorder=no windowState=maximize minimizeButton=no singleInstance=yes sysMenu=no VERSION="1.0" WINDOWSTATE="maximize"/> </head><style>@import url('https://fonts.googleapis.com/css2?family=Didact+Gothic&display=swap');@import url('https://cdnjs.cloudflare.com/ajax/libs/normalize/8.0.1/normalize.css');body { overflow: hidden; font-family: 'Didact Gothic', sans-serif; color:#333; box-sizing: border-box; }* { box-sizing: border-box; }a { text-decoration: none;}header { background-color: #f2f2f2; height: 90px; }nav { width: 960px; margin: 0 auto; display: flex; justify-content: space-between;}.logo { width: 100px;}.logo img { width: 100px; }.lang-menu { width: 100px; text-align: right; font-weight: bold; margin-top: 25px; position: relative;}.lang-menu .selected-lang { display: flex; justify-content: space-between; line-height: 2; cursor: pointer;}.lang-menu .selected-lang:before { content: ''; display: inline-block; width: 32px; height: 32px; background-image: url(https://www.countryflags.io/us/flat/32.png); background-size: contain; background-repeat: no-repeat;}.lang-menu ul { margin: 0; padding: 0; display: none; background-color: #fff; border: 1px solid #f8f8f8; position: absolute; top: 45px; right: 0px; width: 125px; border-radius: 5px; box-shadow: 0px 1px 10px rgba(0,0,0,0.2);}p{ display: -webkit-box; display: -ms-flexbox; display: inline; -webkit-box-pack: start; -ms-flex-pack: start; justify-content: flex-start; }.lang-menu ul li { list-style: none; text-align: left; display: flex; justify-content: space-between;}.lang-menu ul li a { text-decoration: none; width: 125px; padding: 5px 10px; display: block;}.lang-menu ul li:hover { background-color: #f2f2f2;}.lang-menu ul li a:before { content: ''; display: inline-block; width: 25px; height: 25px; vertical-align: middle; margin-right: 10px; background-size: contain; background-repeat: no-repeat;}.de:before { background-image: url(https://www.countryflags.io/de/flat/32.png);}.en:before { background-image: url(https://www.countryflags.io/us/flat/32.png);}.fr:before { background-image: url(https://www.countryflags.io/fr/flat/32.png);}.ar:before { background-image: url(https://www.countryflags.io/ae/flat/32.png);}.lang-menu:hover ul { display: block;}i { color: #dc143c; font-style: normal;}td{ font-size: 1.4rem; }@media only screen and (max-width: 1370px) { td{ font-size: 1rem; } h1.ex1 { font-size:1.2rem !important; } p.ex2{ font-size:1rem !important; } p.ex3{ font-size:1.4rem !important; } h1#noticefirst{ font-size:1.5rem !important; } } </style> </style> <body> <div style="margin-left: 60px; margin-right: 60px; margin-top:20px;"> <div style="display: inline; "> <p class="ex3" style="border-left: 6px solid rgb(255, 55, 55); font-size: 40px; background-color: rgb(255, 255, 255); padding-left: 10px; color: rgb(88, 88, 88); "><strong >SurtrRansomware</strong> </p> </div> <div style="width: 100%; border-radius: 4px; margin-top: 10px; border-style: solid; border-color: rgb(255, 78, 78); border-width: 0.5px; text-align: center; background-color: rgb(255, 249, 249); "> <h1 style="font-size: 1.8rem; margin-left: 10px; "> OOPS ALL YOUR <b style="color: #fff; background-color: rgb(248, 26, 26); padding: 4px; font-size: 1.8rem; ">IMPORTANT FILES</b> HAVE BEEN ENCRYPTED AND <b style="color: #fff; background-color: rgb(248, 26, 26); padding: 4px; font-size: 1.8rem; ">STOLEN !!</b></h1> </div> <h1 id="noticefirst" > Notice : There is only one way to restore your data read the boxes carefully! </h1> <div style="width: 100%; border-radius: 4px; border-style: solid; position: relative; border-color: rgb(248, 26, 26); border-width: 0.5px 0.5px 0.5px 25px; background-color: rgb(255, 227, 227); padding-top: 1%; padding-bottom: 1%; "> <div style="width: 100%; margin-top: -7px;"> <h1 class="ex1" style=" margin-bottom: 7px; margin-top: 0px; margin-left: 10px; font-size:1.8rem; color: #000; ">Attention :</h1> </div> <div style="width: 48%; display: inline-block; position: absolute; right : 0; "> <div style=" height:100%; margin-left: 15px; "> <table > <tbody> <tr> <td style="text-align: center; color: #dc143c; padding: 0px; vertical-align: middle; " width="20">&#9762;</td> <td style=" text-align: left; padding: 0px; vertical-align: middle; " ><strong> Do Not change file names.</strong></td> </tr> <tr style="height: 56px; "> <td style=" text-align: center; color: #dc143c; padding: 0px; vertical-align: middle; " width="20">&#9762;</td> <td style=" text-align: left; padding: 0px; vertical-align: middle; " ><strong>Do Not try to decrypt using third party softwares , it may cause permanent data loss .</strong></td> </tr> <tr> <td style=" text-align: center; color: #dc143c; padding: 0px; vertical-align: middle; " width="20">&#9762;</td> <td style=" text-align: left; padding: 0px; vertical-align: middle; " ><strong>your files will be sold on the Dark Web after 15 days. Imagine 1 million hackers have all your information including files, IP, name and number and location and ...</strong></td> </tr> </tbody> </table> </div> </div> <div style="width: 48%; display: inline-block; "> <div style=" height:100%; margin-left: 15px; "> <table > <tbody> <tr> <td style=" text-align: center; color: #dc143c; padding: 0px; vertical-align: middle; " width="20">&#9762;</td> <td style=" text-align: left; padding: 0px; vertical-align: middle; " ><strong> Do not pay any money before decrypting the test files.</strong></td> </tr> <tr style="height: 56px; "> <td style=" text-align: center; color: #dc143c; padding: 0px; vertical-align: middle; "width="20">&#9762;</td> <td style=" text-align: left; padding: 0px; vertical-align: middle; " ><strong> You can use our 50% discount if you pay the fee within first 15 days of encryption . otherwise the price will be doubled.</strong></td> </tr> <tr > <td style=" text-align: center; color: #dc143c; padding: 0px; vertical-align: middle; " width="20">&#9762;</td> <td style=" text-align: left; padding: 0px; vertical-align: middle; " ><strong> In order to warranty you , our team will decrypt 3 of your desired files for free.but you need to pay the specified price for the rest of the operation .</strong></td> </tr> </tbody> </table> </div> </div> </div> <div style="width: 100%; border-radius: 4px; margin-top: 5px; "> <div style="width: 100%; display: flex; flex-direction: column; border-style: solid; padding top: 1%; padding-bottom: 1%; border-color: #4d53eb; border-width: 0.5px 0.5px 0.5px 25px; border-radius: 4px; background-color: #f3f3fc; " > <div><h1 class="ex1" style=" margin-bottom: 7px; margin-top: 0px; margin-left: 10px; font-size:1.6rem; color: #000; ">How To Decrypt :</h1></div> <div style=" height:100%; margin-left: 15px; "> <table style="table-layout: fixed; "> <tbody> <tr> <td style=" text-align: center; color: #dc143c; padding: 0px; vertical-align: middle; " width="20">&#9762;</td> <td style=" text-align: left; padding: 0px; vertical-align: middle; " ><strong> Your system is offline . in order to contact us you can email this address <i> [email protected] </i> use this ID (<i style="color: #dc143c; " >8I1hOslH3UfNIt</i>) for the title of your email .</strong></td> </tr> <tr style="height: 56px; "> <td style=" text-align: center; color: #dc143c; padding: 0px; vertical-align: middle; " width="20">&#9762;</td> <td style=" text-align: left; padding: 0px; vertical-align: middle; " ><strong> If you weren't able to contact us within 24 hours please email : <i > [email protected] </i></strong></td> </tr> <tr> <td style=" text-align: center; color: #dc143c; padding: 0px; vertical-align: middle; " width="20">&#9762;</td> <td style=" text-align: left; padding: 0px; vertical-align: middle; " ><strong> If you didn't get any respond within 48 hours use this link (Not Available Now).send your ID and your cryptor name (SurtrRansomwareUserName) therefore we can create another way to contact you as soon as possible </i></strong></td> </tr> </tbody> </table> </div> </div> </div></body></html>
URLs

http-equiv="x-ua-compatible"

Targets

    • Target

      2025-03-06_6c2b5d1e5204f83e16265da3600d48e0_ryuk

    • Size

      1.3MB

    • MD5

      6c2b5d1e5204f83e16265da3600d48e0

    • SHA1

      dc40c80e3444ca688779cd81a2b93964fa909b89

    • SHA256

      805cb28b3e595afe97a6e4ac5051ca11b34d72f4dff2af4581cf74a6b126af43

    • SHA512

      5d2eb6e70eda83e491bbc993eec57c35245a9340f6526e6e0abad3c1ebe0c3457e0efc5c6012463ece384de771bb76b3e3f0cf8357a8e71f7c7ac18d66af4e78

    • SSDEEP

      24576:rdtwbXPGBkNXi/Z479uN0/XuNRMLDy5VURkmqpK1Oshy1ZT2rpo3NahUXz+xRE3n:rxLyEuPFvN/a

    • Detects Surtr Payload

    • Modifies Windows Defender DisableAntiSpyware settings

    • Surtr

      Ransomware family first seen in late 2021.

    • Surtr family

    • Clears Windows event logs

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies boot configuration data using bcdedit

    • Renames multiple (9646) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Blocklisted process makes network request

    • Disables Task Manager via registry modification

    • Disables use of System Restore points

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Share Discovery

      Attempt to gather information on host network.

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Hide Artifacts: Hidden Files and Directories

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks