Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

25/03/2025, 13:12

250325-qfl42aznw9 10

25/03/2025, 13:09

250325-qdtq4aznv6 10

25/03/2025, 13:05

250325-qbtcjszns3 10

25/03/2025, 13:01

250325-p9k86awxat 10

25/03/2025, 12:55

250325-p58tnawwe1 10

25/03/2025, 12:51

250325-p3txqazmt6 10

05/02/2025, 11:16

250205-ndjvsavrdm 10

16/07/2024, 08:54

240716-kt64gavakp 10

General

  • Target

    533.7z

  • Size

    2.7MB

  • Sample

    250325-qbtcjszns3

  • MD5

    7aded2388d27c5dc782dca435f160857

  • SHA1

    744f53fe1f4c7a43a82e1a942eb71f4175da8935

  • SHA256

    3730e9cba4a93bc985ef7cd2368ccbf5eccd4724f514b38b20e320e5553dd08d

  • SHA512

    518957e9248e65c5231e10c3977d01f7d3b4aa43f08b00c668be8501a88e06d1eaa2a5aaf976ab9caa1d2eacbc7a2029731d5a7054df230aaf93a79294d9083b

  • SSDEEP

    49152:BdRLSYLgm9h2iT/1Xd6STMtS07Cqjgfzj8flramouva2dd1ALRNyndSBSJQIQV:BdNtJPDJXd62MY50R+a5X1my8BSJQzV

Malware Config

Extracted

Family

blackmatter

Version

1.2

Botnet

512478c08dada2af19e49808fbda5b0b

Credentials
C2

https://paymenthacks.com

http://paymenthacks.com

https://mojobiden.com

http://mojobiden.com

Attributes
  • attempt_auth

    true

  • create_mutex

    true

  • encrypt_network_shares

    true

  • exfiltrate

    true

  • mount_volumes

    true

rsa_pubkey.base64
aes.base64

Extracted

Path

C:\PerfLogs\How To Restore Your Files.txt

Ransom Note
----------- [ Hello! ] -------------> ******BY ANUBIZ LOCKER****** What happend? ---------------------------------------------- Your computers and servers are encrypted, backups are deleted from your network and copied. We use strong encryption algorithms, so you cannot decrypt your data. But you can restore everything by purchasing a special program from us - a universal decoder. This program will restore your entire network. Follow our instructions below and you will recover all your data. If you continue to ignore this for a long time, we will start reporting the hack to mainstream media and posting your data to the dark web. What guarantees? ---------------------------------------------- We value our reputation. If we do not do our work and liabilities, nobody will pay us. This is not in our interests. All our decryption software is perfectly tested and will decrypt your data. We will also provide support in case of problems. We guarantee to decrypt one file for free. How to contact us? ---------------------------------------------- Using EMAIL: 1) Open your mail 2) Write this ID in the title of your message: kFdfAV0C4B 3) Write us: [email protected] !!! DANGER !!! DO NOT MODIFY or try to RECOVER any files yourself. We WILL NOT be able to RESTORE them. !!! DANGER !!

Extracted

Path

C:\Program Files\Restore-My-Files.txt

Ransom Note
LockBit 2.0 Ransomware Your data are stolen and encrypted The data will be published on TOR website http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion and https://bigblog.at if you do not pay the ransom You can contact us and decrypt one file for free on these TOR sites http://lockbitsup4yezcd5enk5unncx3zcy7kw6wllyqmiyhvanjj352jayid.onion http://lockbitsap2oaqhcun3syvbqt6n5nzt7fqosc6jdlmsfleu3ka4k2did.onion OR https://decoding.at Decryption ID: D89C6F255199BB9E6B3A6D3617E1A9C2
URLs

http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion

https://bigblog.at

http://lockbitsup4yezcd5enk5unncx3zcy7kw6wllyqmiyhvanjj352jayid.onion

http://lockbitsap2oaqhcun3syvbqt6n5nzt7fqosc6jdlmsfleu3ka4k2did.onion

https://decoding.at

Extracted

Path

C:\Users\Admin\Desktop\LockBit_Ransomware.hta

Ransom Note
<html><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8" /><meta http-equiv="x-ua-compatible" content="ie=9" /><title>LockBit</title><hta:application id=LockBit applicationName=LockBit selection=no scroll=no contextmenu=no innerBorder=no windowState=maximize minimizeButton=no singleInstance=yes sysMenu=no /><meta name="viewport" content="width=device-width, initial-scale=1.0" /><style>html{font-size:100%}body{position:relative;border:0;font-family:Arial;padding:1% 0 0;margin:0;width:100vw;height:100vh;overflow:hidden}*{font-size:1rem}.g1{content:"";position:absolute;left:0;top:50%;transform:translateY(-50%);height:368px;width:150px;z-index:-1}.g2{z-index:-1;content:"";position:absolute;right:0;top:50%;transform:translateY(-50%);height:368px;width:150px}.container{width:90%;margin:auto}.container img{max-width:100%}.ht{margin-bottom:1%;position:relative;padding-left:16px;font-weight:900;font-size:1rem;line-height:100%;letter-spacing:.05em;text-transform:uppercase;color:#dedede}.hb{margin-bottom:1%}.hb img{width:850px;max-width:100%}.hi{margin-bottom:1rem;background:#fcfcfd;border:1px dashed #f71b3a;box-sizing:border-box;border-radius:4px;padding:1rem 3rem;width:100%}.hit{margin-bottom:1%;font-weight:700;font-size:.9rem;line-height:100%;color:#222}.hib{font-weight:700;font-size:.9rem;line-height:100%;color:#f71b3a}.main-p{font-weight:700;font-size:1rem;line-height:125%;color:#333160}.mn{position:absolute;width:5%;height:276px;top:3rem}.mn img{max-width:90%}.ml1{position:absolute;width:50%;height:10rem;left:0;top:0;background:#f3f3fc;border:1px solid #cfd3da;box-sizing:border-box;padding:2%}.ml2{position:absolute;width:50%;height:13rem;left:0;top:11rem;background:#f3f3fc;border:1px solid #cfd3da;box-sizing:border-box;padding:2%}.mr3{position:absolute;padding:2%;width:48%;height:24rem;left:52%;top:0;background:#ffdfdf;border:1px solid #ffa5aa;box-sizing:border-box;border-radius:4px;font-size:15px;line-height:130%}.mlb{font-size:.8rem;line-height:1.2;color:#8988a4;margin-top:2%;margin-bottom:2%}.mlb img{max-width:14px}.sp1{left:0;top:50%;position:absolute;display:block;width:6px;height:6px;background:#f71b3a;transform:translateY(-50%) rotate(135deg)}.mll{font-size:.9rem;line-height:1.2;color:#333160;margin-bottom:2%;position:relative;padding-left:20px}.mll a{font-size:.8rem}.mlt{margin-bottom:15px;font-weight:700;font-size:.9rem;line-height:1.2;color:#333160}.mlt img{max-width:14px;position:relative}.mrli{font-size:.9rem;line-height:1.2;margin-bottom:2%;position:relative;padding-left:25px;color:#222}.mrli a{font-size:.9rem}</style><script type="text/javascript">function o(c){var d=new ActiveXObject("WScript.Shell");d.run(c.href)};</script></head><body bgcolor="#F8F8F8" text="buttontext"><img class="g1" src="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAJYAAAFwAQMAAABgpRCKAAAABlBMVEXw8PDv7+81SmF7AAAAAXRSTlMBN+Ho8AAAAWpJREFUeAHt1slxBCEMhWFRs3AkhA7BIRAahEYIDoEQOM5CIfvOX2V5nwWOX+8t6RWirzIt1QamGayDaQY7gSlZBTuBKVkBO4ENMM1gFayBdTAly2AV7ATWwQaYZrACVsFOYB1sgClZBitgDewE1sGG0ZSsGK2CNbATWP/YDC/t6K9uYDsqe4Kyb/Pflx0Y9mUEC9CrHnrVgeHgRLANhimA+fkniAPDaU9gERJgI4PoCWAe0mMH5sAgytgSWIQMJdvIIC6D0TwZFGRnNEcGhSOT71iai/4ti39mJyim9bxly27TdFpkFayBnYzWly1btuxH7AVMElgAc2CSwCJYAPNgDkzIElgE24wWwLzRdkZzRpPvWFom+rPmjLYzmjda+EY/R7AEZpxBDxZuyPyN2+7Gzd2hya1buiFTmzmwHZgHiw+8l1q27PTD1r5h1WjFaBlMZhtG62AnsAZWwDKYzNbBGliZbchs9Z3eAJcyeuremDsyAAAAAElFTkSuQmCC" /><img class="g2" src="data:image/png;base64,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" /><div class="container" style=""><div style="text-align:center;margin-bottom:15px"><img alt="" src="data:image/svg+xml;base64,<svg width="146" height="20" viewBox="0 0 146 20" fill="none" xmlns="http://www.w3.org/2000/svg">
<path fill-rule="evenodd" clip-rule="evenodd" d="M21.8395 19.5575C23.9416 19.0412 26 17.8178 26 14.5211C26 11.6456 25.1334 10.0641 23.9778 10.0641C25.1334 10.0641 26 8.33884 26 5.46338C26 3.88187 25.2778 0 18.7779 0H12.0494L8.72711 3.30677H12.5067L14.559 1.26397L14.6314 1.19201H14.7336H17.0446H19.2114C20.0394 1.19201 21.3493 1.41471 22.4609 2.07106C23.584 2.73426 24.5136 3.84895 24.5136 5.60713C24.5136 7.54073 23.8356 8.70665 22.7931 9.37231C22.3205 9.67412 21.7822 9.86666 21.2176 9.98638C21.7913 10.1706 22.3332 10.4363 22.8061 10.7828C23.8178 11.5237 24.5136 12.6358 24.5136 14.0897C24.5136 15.3531 24.1772 16.5047 23.3199 17.3386C22.7232 17.9191 21.8938 18.3264 20.7977 18.5204L21.8395 19.5575ZM12.1376 9.90042L10.5687 8.33884H17.823L16.2541 9.90042H12.1376ZM13.8909 11.6456L12.4667 10.228H16.3222H16.3905L16.4387 10.18L18.2884 8.33884H19.3557C21.5222 8.33884 22.389 7.04488 22.389 5.75092C22.389 4.31319 21.8112 3.30677 19.3557 3.30677H13.2049L14.8358 1.68339H17.0446H19.2114C19.9721 1.68339 21.19 1.89202 22.2089 2.49368C23.2164 3.08848 24.0199 4.05852 24.0199 5.60713C24.0199 7.41161 23.398 8.40229 22.5265 8.95872C21.6325 9.52959 20.4301 9.67463 19.2114 9.67463V10.166C20.3947 10.166 21.6053 10.5133 22.5135 11.1785C23.4158 11.8393 24.0199 12.8119 24.0199 14.0897C24.0199 15.2706 23.7064 16.2755 22.9748 16.9872C22.4084 17.5381 21.5673 17.9368 20.3644 18.0891L18.9464 16.6777H19.3557C21.2334 16.6777 22.389 15.2399 22.389 14.0898C22.389 12.9396 21.8112 11.6456 19.3557 11.6456H13.8909ZM5.51315 3.30677L3.88223 1.68339H6.21153H6.31372L6.38596 1.61143L8.00487 0H11.3511L8.02907 3.30677H5.51315ZM1.98061 3.49676L3.34824 4.85805V9.11607L0 12.4487V8.25537L1.9082 6.35595L1.98061 6.28399V6.18221V3.49676ZM3.38856 1.19201H6.10918L7.30682 0H3.34824H2.19108L3.38856 1.19201ZM0.000328933 0H0V0.000261021L0.000328933 0ZM0 1.52537L1.48694 3.00537V6.08044L0 7.56045V1.52537ZM15.2087 16.6636L18.5569 19.9961C18.3442 20.0022 18.0672 20.0002 17.8307 19.9963H15.3834L12.0352 16.6636H15.2087ZM0 13.1437V19.996V19.9963H10.352L8.99814 18.6486H1.73377H1.48694V18.4029V16.1026V16.0008L1.55918 15.9288L3.34824 14.1481V9.81098L0 13.1437ZM3.34824 14.843L1.98061 16.2043V18.1572H9.10033H9.20252L9.27493 18.2291L11.0502 19.9963H14.6852L11.337 16.6636H3.34824V14.843Z" fill="#F71B3A"/>
<path d="M146 2H85V18H146V2Z" fill="#F71B3A"/>
<path d="M35 3.60105H37.9167V13.7912H41.8372V16.2581H35V3.60105ZM50.5258 3.31641C52.5207 3.31641 54.1495 3.92989 55.4122 5.15709C56.7254 6.43474 57.3818 8.02873 57.3818 9.93906C57.3818 11.8239 56.7254 13.4054 55.4122 14.6831C54.1369 15.9228 52.5081 16.5427 50.5258 16.5427C48.5308 16.5427 46.8894 15.9228 45.6015 14.6831C44.9828 14.1011 44.4967 13.4054 44.1432 12.5957C43.8023 11.7735 43.6318 10.9006 43.6318 9.97702C43.6318 9.09139 43.8086 8.21849 44.1621 7.35831C44.5283 6.48541 45.0018 5.75807 45.5826 5.17606C46.82 3.93637 48.4677 3.31641 50.5258 3.31641ZM50.5069 6.01101C49.3831 6.01101 48.4614 6.37156 47.7417 7.09265C46.9967 7.81374 46.6243 8.7688 46.6243 9.95804C46.6243 11.0966 47.0094 12.0454 47.7796 12.8045C48.5119 13.5003 49.4147 13.8481 50.4879 13.8481C51.6369 13.8481 52.5713 13.4876 53.291 12.7665C54.0233 12.0581 54.3894 11.1156 54.3894 9.93906C54.3894 8.77527 54.0233 7.82647 53.291 7.09265C52.546 6.37156 51.618 6.01101 50.5069 6.01101ZM69.817 12.5008V15.8596C68.9206 16.315 67.9926 16.5427 67.0329 16.5427C64.9748 16.5427 63.3208 15.9293 62.0708 14.7021C60.7577 13.4244 60.1011 11.8239 60.1011 9.90111C60.1011 8.0035 60.7577 6.41576 62.0708 5.13811C63.3208 3.92364 64.8928 3.31641 66.7867 3.31641C67.721 3.31641 68.7312 3.55037 69.817 4.01852V7.39626C68.971 6.49814 67.9861 6.04896 66.8625 6.04896C65.827 6.04896 64.9685 6.37781 64.2867 7.03572C63.4912 7.80749 63.0935 8.78152 63.0935 9.95804C63.0935 11.1093 63.4596 12.0392 64.192 12.7475C64.899 13.4559 65.8081 13.8102 66.9193 13.8102C67.9672 13.8102 68.9331 13.3737 69.817 12.5008ZM76.2085 3.60105V8.8764L80.5267 3.60105H84.0874L78.9737 9.59749L84.4851 16.2581H80.7351L76.2085 10.6412V16.2581H73.2919V3.60105H76.2085Z" fill="#222222"/>
<path d="M87.1172 3.60156H90.9808C92.4454 3.60156 93.5187 3.92416 94.2006 4.56934C94.8066 5.15135 95.1097 5.94835 95.1097 6.96033C95.1097 7.59279 94.9708 8.1306 94.693 8.5733C94.4405 8.99077 94.0869 9.30064 93.6324 9.50313C94.3394 9.61698 94.9203 9.90163 95.3748 10.3571C95.9178 10.9011 96.1892 11.6537 96.1892 12.6152C96.1892 13.6651 95.861 14.5191 95.2044 15.177C94.4595 15.8981 93.3483 16.2586 91.871 16.2586H87.1172V3.60156ZM89.996 5.8787V8.74408H90.4695C91.1261 8.74408 91.6186 8.62398 91.9468 8.38354C92.2877 8.1431 92.4581 7.77005 92.4581 7.26395C92.4581 6.80852 92.2939 6.45423 91.9657 6.20129C91.6878 5.9863 91.1829 5.8787 90.4505 5.8787H89.996ZM89.996 10.9074V13.9815H90.6968C91.7701 13.9815 92.4898 13.8107 92.8559 13.4691C93.1337 13.2162 93.2725 12.8619 93.2725 12.4065C93.2725 11.9638 93.14 11.6222 92.8748 11.3818C92.5339 11.0654 91.8394 10.9074 90.7915 10.9074H89.996ZM99.5558 3.60156H102.472V16.2586H99.5558V3.60156ZM113.602 6.06845H110.856V16.2586H107.939V6.06845H105.193V3.60156H113.602V6.06845Z" fill="white"/>
<path d="M126.146 13.53V16H116.456L120.256 11.858C121.181 10.8193 121.871 9.958 122.327 9.274C122.834 8.46333 123.087 7.74767 123.087 7.127C123.087 6.595 122.922 6.177 122.593 5.873C122.327 5.63233 121.941 5.512 121.434 5.512C120.94 5.512 120.554 5.664 120.275 5.968C119.92 6.36067 119.743 6.88 119.743 7.526H116.817C116.931 6.20867 117.368 5.151 118.128 4.353C118.951 3.479 120.117 3.042 121.624 3.042C122.979 3.042 124.075 3.441 124.911 4.239C125.696 5.02433 126.089 6.03767 126.089 7.279C126.089 8.25433 125.772 9.18533 125.139 10.072C124.759 10.604 124.081 11.3323 123.106 12.257L121.776 13.53H126.146ZM127.849 15.81C127.519 15.468 127.355 15.0563 127.355 14.575C127.355 14.0937 127.519 13.6883 127.849 13.359C128.191 13.017 128.602 12.846 129.084 12.846C129.565 12.846 129.97 13.017 130.3 13.359C130.642 13.6883 130.813 14.0937 130.813 14.575C130.813 15.0563 130.642 15.468 130.3 15.81C129.97 16.1393 129.565 16.304 129.084 16.304C128.602 16.304 128.191 16.1393 127.849 15.81ZM141.687 9.673C141.687 12.0037 141.079 13.7707 139.863 14.974C138.963 15.848 137.83 16.285 136.462 16.285C135.119 16.285 133.998 15.848 133.099 14.974C131.883 13.7707 131.275 12.0037 131.275 9.673C131.275 7.30433 131.883 5.531 133.099 4.353C133.998 3.479 135.119 3.042 136.462 3.042C137.83 3.042 138.963 3.479 139.863 4.353C141.079 5.531 141.687 7.30433 141.687 9.673ZM137.659 6.025C137.329 5.70833 136.937 5.55 136.481 5.55C136.025 5.55 135.632 5.70833 135.303 6.025C134.593 6.72167 134.239 7.93133 134.239 9.654C134.239 11.3893 134.593 12.6053 135.303 13.302C135.632 13.6187 136.025 13.777 136.481 13.777C136.937 13.777 137.329 13.6187 137.659 13.302C138.368 12.6053 138.723 11.3893 138.723 9.654C138.723 7.93133 138.368 6.72167 137.659 6.025Z" fill="white"/>
</svg>
" /></div><div class="hb" style="text-align:center"><img alt="" src="data:image/svg+xml;base64,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
URLs

http-equiv="Content-Type"

http-equiv="x-ua-compatible"

https://decoding.at

Extracted

Path

C:\Program Files\Java\jdk1.7.0_80\db\bin\Restore-My-Files.txt

Ransom Note
LockBit 2.0 Ransomware Your data are stolen and encrypted The data will be published on TOR website http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion and https://bigblog.at if you do not pay the ransom You can contact us and decrypt one file for free on these TOR sites http://lockbitsup4yezcd5enk5unncx3zcy7kw6wllyqmiyhvanjj352jayid.onion http://lockbitsap2oaqhcun3syvbqt6n5nzt7fqosc6jdlmsfleu3ka4k2did.onion OR https://decoding.at Decryption ID: D89C6F255199BB9E650A68C52645DCAF
URLs

http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion

https://bigblog.at

http://lockbitsup4yezcd5enk5unncx3zcy7kw6wllyqmiyhvanjj352jayid.onion

http://lockbitsap2oaqhcun3syvbqt6n5nzt7fqosc6jdlmsfleu3ka4k2did.onion

https://decoding.at

Extracted

Path

C:\Program Files\Restore-My-Files.txt

Ransom Note
LockBit 2.0 Ransomware Your data are stolen and encrypted The data will be published on TOR website http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion and https://bigblog.at if you do not pay the ransom You can contact us and decrypt one file for free on these TOR sites http://lockbitsup4yezcd5enk5unncx3zcy7kw6wllyqmiyhvanjj352jayid.onion http://lockbitsap2oaqhcun3syvbqt6n5nzt7fqosc6jdlmsfleu3ka4k2did.onion OR https://decoding.at Decryption ID: D89C6F255199BB9EB47678D3103C97A8
URLs

http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion

https://bigblog.at

http://lockbitsup4yezcd5enk5unncx3zcy7kw6wllyqmiyhvanjj352jayid.onion

http://lockbitsap2oaqhcun3syvbqt6n5nzt7fqosc6jdlmsfleu3ka4k2did.onion

https://decoding.at

Extracted

Path

C:\Users\Admin\Desktop\LockBit_Ransomware.hta

Ransom Note
Any attempts to restore your files with the thrid-party software will be fatal for your files! To recovery your data and not to allow data leakage, it is possible only through purchase of a private key from us There is only one way to get your files back: Through a standard browser Brave (supports Tor links) FireFox Chrome Edge Opera Open link - https://decoding.at/ Through a Tor Browser - recommended Download Tor Browser - https://www.torproject.org/ and install it. Open one of links in Tor browser and follow instructions on these pages: http://lockbitsap2oaqhcun3syvbqt6n5nzt7fqosc6jdlmsfleu3ka4k2did.onion/or mirrorhttp://lockbitsup4yezcd5enk5unncx3zcy7kw6wllyqmiyhvanjj352jayid.onion/These links work only in the Tor browser! Follow the instructions on this page https://decoding.at may be blocked. We recommend using a Tor browser (or Brave) to access the TOR site Do not rename encrypted files. Do not try to decrypt using third party software, it may cause permanent data loss. Decryption of your files with the help of third parties may cause increased price (they add their fee to our). Tor Browser may be blocked in your country or corporate network. Use https://bridges.torproject.org or use Tor Browser over VPN. Tor Browser user manual https://tb-manual.torproject.org/about All your stolen important data will be loaded into our blog if you do not pay ransom. Our blog http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion or https://bigblog.at where you can see data of the companies which refused to pay ransom.
URLs

https://decoding.at/

http://lockbitsap2oaqhcun3syvbqt6n5nzt7fqosc6jdlmsfleu3ka4k2did.onion/or

https://decoding.at

http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion

https://bigblog.at

Extracted

Path

C:\Program Files\Restore-My-Files.txt

Ransom Note
LockBit 2.0 Ransomware Your data are stolen and encrypted The data will be published on TOR website http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion and https://bigblog.at if you do not pay the ransom You can contact us and decrypt one file for free on these TOR sites http://lockbitsup4yezcd5enk5unncx3zcy7kw6wllyqmiyhvanjj352jayid.onion http://lockbitsap2oaqhcun3syvbqt6n5nzt7fqosc6jdlmsfleu3ka4k2did.onion OR https://decoding.at Decryption ID: D89C6F255199BB9E0B383F55A56BFD57
URLs

http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion

https://bigblog.at

http://lockbitsup4yezcd5enk5unncx3zcy7kw6wllyqmiyhvanjj352jayid.onion

http://lockbitsap2oaqhcun3syvbqt6n5nzt7fqosc6jdlmsfleu3ka4k2did.onion

https://decoding.at

Extracted

Path

C:\Program Files\Restore-My-Files.txt

Ransom Note
LockBit 2.0 Ransomware Your data are stolen and encrypted The data will be published on TOR website http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion and https://bigblog.at if you do not pay the ransom You can contact us and decrypt one file for free on these TOR sites http://lockbitsup4yezcd5enk5unncx3zcy7kw6wllyqmiyhvanjj352jayid.onion http://lockbitsap2oaqhcun3syvbqt6n5nzt7fqosc6jdlmsfleu3ka4k2did.onion OR https://decoding.at Decryption ID: D89C6F255199BB9EA4D1D528D31CFD8B
URLs

http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion

https://bigblog.at

http://lockbitsup4yezcd5enk5unncx3zcy7kw6wllyqmiyhvanjj352jayid.onion

http://lockbitsap2oaqhcun3syvbqt6n5nzt7fqosc6jdlmsfleu3ka4k2did.onion

https://decoding.at

Targets

    • Target

      7d98972d5c78e1d4969da76856d6818942b606c267efa67fd31d39ae77497e9c.exe

    • Size

      894KB

    • MD5

      ec8fef72a73ff94440235fc1b3f3f690

    • SHA1

      e651cd12a2493b9c2d7ebd8287a2fd29b8f4cd9c

    • SHA256

      7d98972d5c78e1d4969da76856d6818942b606c267efa67fd31d39ae77497e9c

    • SHA512

      b62f2f518f4ed3d74d96551a8c7431d50bd3349221b4b01dded18a270cbdbd1441f13f3eef7a6cc0db4aad200f1cf2babeb8e937edf8827faa7a03e4b59a35f2

    • SSDEEP

      12288:d31hZus7pQqiiyuuFuawu2zhjWBv4+1FMUUfW75CXQKXTZ1VG:1r1S+NjWx4+1SWV6Q4n

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (12699) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Target

      87b9b910d5d5a053e3b39989cc6fd51601abdaea207a26c765f21f43a4cd4dcb.exe

    • Size

      79KB

    • MD5

      c8579ccb6690e1f2102f9ba887c12f9e

    • SHA1

      e8e46e3f88011aa43c90cde3c9945e3508986a25

    • SHA256

      87b9b910d5d5a053e3b39989cc6fd51601abdaea207a26c765f21f43a4cd4dcb

    • SHA512

      f579e9b39400a0b3879dc8a1c41bd829d8f6b399d9d0a97302f7157a76f036ede5e4391eeb12bd2285a7f523969d572a92f482cf415ed2fb023d96d745f82244

    • SSDEEP

      1536:hxpkWBeG/vEbKsrQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG2Xsf8:/BeQsKsrQLOJgY8Zp8LHD4XWaNH71dLH

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (169) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Target

      8958d7b8c51215d6a27444b2760f1ce843a414d380052e6e71c2af6e9ab69ce2.exe

    • Size

      959KB

    • MD5

      734f101d7a5822e1bf2c66e398ab8c45

    • SHA1

      cafb5d0e3db6804693e8461b32abf678e8c70f3d

    • SHA256

      8958d7b8c51215d6a27444b2760f1ce843a414d380052e6e71c2af6e9ab69ce2

    • SHA512

      63cf6ae43a26ce38c062ec69bbc084ba3e8777d3f6f574e6a0a09242cacb46989d01c1dcb32943692c47361f8d6fb8e5009a4cc917a80ffa567cb2a853f1a2fb

    • SSDEEP

      24576:uLjr3s2nScu1i1tz3f++5kRzFxk7rMxNeR1R9qpd2F:Ujrc2So1Ff+B3k796Q

    • Lockbit

      Ransomware family with multiple variants released since late 2019.

    • Lockbit family

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies boot configuration data using bcdedit

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Sets desktop wallpaper using registry

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Target

      ab5be9e6911b43f0974e01dabec772b968274d9b5ea39ba2ad7cd294056e5d09.exe

    • Size

      88KB

    • MD5

      56299609780e2286ccc2cf5857d531e8

    • SHA1

      ef7baf17905784df491641906645f00f73eff1d1

    • SHA256

      ab5be9e6911b43f0974e01dabec772b968274d9b5ea39ba2ad7cd294056e5d09

    • SHA512

      a44053d0c810448adddcd17e51682e43d51710de948644c82a141a1a8104cacedd44a274f13ea79de89f5cdfbb0e436791565baad1552d9853a5a94b446398cb

    • SSDEEP

      1536:7vie0XQsxILOW3Sm9S4AndhgXCpC1VYEzcM5BD11e0z:OeBsxInSNnhgX4CzwM

    • Dharma

      Dharma is a ransomware that uses security software installation to hide malicious activities.

    • Dharma family

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (785) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

    • Target

      b228a698ee826b42e19307f2d34c2620819a67a0e98fd2af08aae570b8178cc0.exe

    • Size

      65KB

    • MD5

      1f31e5377d64f9f26c12f3b7a5545c16

    • SHA1

      b54fdfadaa8c9eec27f2f48e462bde898383f0ba

    • SHA256

      b228a698ee826b42e19307f2d34c2620819a67a0e98fd2af08aae570b8178cc0

    • SHA512

      ff6d85ed6be933d5c90dc8a2554cdc69eeb00f1dbc20a6016ec4813feb9310eab25e93071f93f1d65f1f7453f65d5a830e8e7ff9b1d0846fe969b55a2a340129

    • SSDEEP

      768:5PuzmZ5OzkfCQxmGgV5YlpJ6RIDWeRdppvO/9rjca9zsUKh51zb2Z:5PEz5Qxd6m3WIw9oh5B2Z

    Score
    1/10
    • Target

      c864a70f78fb972f505ae5b13c0ad984e64c547194beb258926bb4c323fac31d.exe

    • Size

      67KB

    • MD5

      5854152baa338613d80ee24af054cfbe

    • SHA1

      2f779048a40cb601af32fe70188c9d3e53e71efe

    • SHA256

      c864a70f78fb972f505ae5b13c0ad984e64c547194beb258926bb4c323fac31d

    • SHA512

      55572a3e99a5ee08dd1319ad565584a4d6680a0aaf50819228c6ec7ab0b6a509dba25de539213e9f3b5bb6e3720344db4d26e52f0fe08c028511f9830f552b18

    • SSDEEP

      768:RVel5lzkfCQxmGgV5YlpJ6RIDWeRdppvO/9rjca9fsUKhnLZbp:Rcz5Qxd6m3WIw9EhX

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks

static1

upx512478c08dada2af19e49808fbda5b0bmakopchaosnefilimmimicblackmattermodiloadergandcrablockbit
Score
10/10

behavioral1

credential_accessdefense_evasiondiscoveryexecutionimpactpersistenceransomwarespywarestealer
Score
9/10

behavioral2

credential_accessdefense_evasiondiscoveryexecutionimpactpersistenceransomwarespywarestealer
Score
9/10

behavioral3

credential_accessdefense_evasiondiscoveryexecutionimpactpersistenceransomwarespywarestealer
Score
9/10

behavioral4

credential_accessdefense_evasiondiscoveryexecutionimpactpersistenceransomwarespywarestealer
Score
9/10

behavioral5

credential_accessdefense_evasiondiscoveryexecutionimpactpersistenceransomwarespywarestealer
Score
9/10

behavioral6

defense_evasiondiscoveryexecutionimpactransomware
Score
10/10

behavioral7

defense_evasiondiscoveryexecutionimpactransomware
Score
10/10

behavioral8

defense_evasiondiscoveryexecutionimpactransomware
Score
10/10

behavioral9

defense_evasiondiscoveryexecutionimpactransomware
Score
10/10

behavioral10

defense_evasiondiscoveryexecutionimpactransomware
Score
10/10

behavioral11

lockbitdefense_evasiondiscoveryevasionexecutionimpactpersistenceransomware
Score
10/10

behavioral12

lockbitdefense_evasiondiscoveryevasionexecutionimpactpersistenceransomware
Score
10/10

behavioral13

lockbitdefense_evasiondiscoveryevasionexecutionimpactpersistenceransomware
Score
10/10

behavioral14

lockbitdefense_evasiondiscoveryevasionexecutionimpactpersistenceransomware
Score
10/10

behavioral15

lockbitdefense_evasiondiscoveryevasionexecutionimpactpersistenceransomware
Score
10/10

behavioral16

dharmacredential_accessdefense_evasiondiscoveryexecutionimpactpersistenceransomwarespywarestealer
Score
10/10

behavioral17

dharmacredential_accessdefense_evasiondiscoveryexecutionimpactpersistenceransomwarespywarestealer
Score
10/10

behavioral18

dharmacredential_accessdefense_evasiondiscoveryexecutionimpactpersistenceransomwarespywarestealer
Score
10/10

behavioral19

dharmacredential_accessdefense_evasiondiscoveryexecutionimpactpersistenceransomwarespywarestealer
Score
10/10

behavioral20

dharmacredential_accessdefense_evasiondiscoveryexecutionimpactpersistenceransomwarespywarestealer
Score
10/10

behavioral21

Score
1/10

behavioral22

Score
1/10

behavioral23

Score
1/10

behavioral24

Score
1/10

behavioral25

Score
1/10

behavioral26

Score
1/10

behavioral27

Score
1/10

behavioral28

Score
1/10

behavioral29

Score
1/10

behavioral30

Score
1/10