Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

25/03/2025, 15:11

250325-skmbpsxzaw 10

25/03/2025, 15:06

250325-sg1d6a1px2 10

25/03/2025, 15:01

250325-sd5jpsxyct 10

25/03/2025, 14:56

250325-sbdcfaxxgs 10

25/03/2025, 14:50

250325-r7ve6a1nv3 10

25/03/2025, 14:46

250325-r5ab7sxwhx 10

25/03/2025, 14:40

250325-r2c9paxwe1 10

05/02/2025, 10:25

250205-mgcefaslhw 10

05/02/2025, 10:17

250205-mbs51atmbk 10

05/02/2025, 09:15

250205-k785zs1pfn 10

General

  • Target

    RS.7z

  • Size

    20.5MB

  • Sample

    250325-sbdcfaxxgs

  • MD5

    2e40472330409ed96f91e8e0bb796eb4

  • SHA1

    8fd90404184de1a627068a93482313449dbbec91

  • SHA256

    c5741701b3866459dd1ffa2477cfd8776713612912693a5897f78aac795d23e9

  • SHA512

    b11720cb8519fc6838161ba8bf696681b242b0789ffd5c442efbb50161d511fd65229ca88a347c856e8ff91501c077f5de7714b09e29d4400f595bfe7829189d

  • SSDEEP

    393216:NkDF1XseDcJIrXeSG0b5mKZ1F0gvpdO8GPnqzHLP3iN5M0CptgNpAcklC0CN:GDjXseDcSra45mKt0gvT0PnMbzkNpAc/

Malware Config

Extracted

Family

blackmatter

Version

1.2

Botnet

512478c08dada2af19e49808fbda5b0b

Credentials
C2

https://paymenthacks.com

http://paymenthacks.com

https://mojobiden.com

http://mojobiden.com

Attributes
  • attempt_auth

    true

  • create_mutex

    true

  • encrypt_network_shares

    true

  • exfiltrate

    true

  • mount_volumes

    true

rsa_pubkey.base64
aes.base64

Extracted

Family

mespinoza

Attributes
  • ransomnote

    Hi Company, Every byte on any types of your devices was encrypted. Don't try to use backups because it were encrypted too. To get all your data back contact us: [email protected] [email protected] [email protected] Also, be aware that we downloaded files from your servers and in case of non-payment we will be forced to upload them on our website, and if necessary, we will sell them on the darknet. Check out our website, we just posted there new updates for our partners: http://wqmfzni2nvbbpk25.onion/ -------------- FAQ: 1. Q: How can I make sure you don't fooling me? A: You can send us 2 files(max 2mb). 2. Q: What to do to get all data back? A: Don't restart the computer, don't move files and write us. 3. Q: What to tell my boss? A: Protect Your System Amigo.

Extracted

Family

sodinokibi

Botnet

$2a$10$kmb3nsvQXC.93GYNCGKy/uq9hYHivf0e3HcajFIifr8Hf3fmnofgm

Campaign

7258

Decoy

gasbarre.com

all-turtles.com

rksbusiness.com

christ-michael.net

mardenherefordshire-pc.gov.uk

erstatningsadvokaterne.dk

marchand-sloboda.com

unim.su

bauertree.com

faronics.com

moveonnews.com

autopfand24.de

mountsoul.de

beaconhealthsystem.org

cerebralforce.net

aprepol.com

kaotikkustomz.com

dubnew.com

simulatebrain.com

alvinschwartz.wordpress.com

Attributes
  • net

    true

  • pid

    $2a$10$kmb3nsvQXC.93GYNCGKy/uq9hYHivf0e3HcajFIifr8Hf3fmnofgm

  • prc

    outlook

    agntsvc

    infopath

    sqbcoreservice

    steam

    firefox

    ocomm

    ocssd

    mydesktopqos

    oracle

    powerpnt

    wordpad

    synctime

    sql

    thebat

    onenote

    excel

    visio

    encsvc

    winword

    mydesktopservice

    dbsnmp

    isqlplussvc

    tbirdconfig

    mspub

    msaccess

    thunderbird

    ocautoupds

    xfssvccon

    dbeng50

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] Data leak [+] First of all we have uploaded more then 70 GB archived data from your file server and SQL server Example of data: - Accounting - Finance - Personal Data - Banking data - Confidential files And more other... Our blog: http://dnpscnbaix6nkwvystl3yxglz7nteicqrou3t75tpcc5532cztc46qyd.onion/ Read what happens to those who do not pay. We are ready: - To provide you the evidence of stolen data - To give you universal decrypting tool for all encrypted files. - To delete all the stolen data. [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    7258

  • svc

    svc$

    vss

    sophos

    mepocs

    backup

    sql

    memtas

    veeam

Extracted

Family

sodinokibi

Botnet

$2a$10$dfjpLrXuDytfF.kmYtQ1ROgsXjTJEe8EmQT65ftxlTpJtXPZrhsAq

Campaign

7178

Decoy

kamahouse.net

bridgeloanslenders.com

abitur-undwieweiter.de

live-your-life.jp

xn--rumung-bua.online

anteniti.com

marcuswhitten.site

ostheimer.at

joseconstela.com

deepsouthclothingcompany.com

dr-seleznev.com

ecpmedia.vn

aunexis.ch

anthonystreetrimming.com

pocket-opera.de

mooreslawngarden.com

osterberg.fi

extraordinaryoutdoors.com

kamienny-dywan24.pl

fitovitaforum.com

Attributes
  • net

    false

  • pid

    $2a$10$dfjpLrXuDytfF.kmYtQ1ROgsXjTJEe8EmQT65ftxlTpJtXPZrhsAq

  • prc

    avgadmsv

    BackupUpdater

    ocautoupds

    synctime

    thebat

    excel

    isqlplussvc

    ccSetMgr

    SPBBCSvc

    Sage.NA.AT_AU.SysTray

    lmibackupvssservice

    CarboniteUI

    powerpnt

    BackupMaint

    onenote

    klnagent

    sql

    Rtvscan

    xfssvccon

    Smc

    mspub

    encsvc

    LogmeInBackupService

    kavfsscs

    ccSvcHst

    BackupExtender

    NSCTOP

    outlook

    dbsnmp

    mydesktopservice

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] Attention!!! [+] Also your private data was downloaded. We will publish it in case you will not get in touch with us asap. [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    7178

  • svc

    ssistelemetry

    adsync

    svc$

    msseces

    mbamservice

    ssastelemetry

    altaro

    sbamsvc

    ds_notifier

    ntrtscan

    ofcservice

    code42service

    macmnsvc

    memtas

    auservice

    telemetryserver

    tmccsf

    psqlwge

    sppsvc

    viprepplsvc

    azurea

    ds_monitor

    swi_filter

    protectedstorage

    mfemms

    mfevtp

    kaseyaagentendpoint

    ltservice

    dssvc

    altiback

Extracted

Path

C:\Recovery\WindowsRE\HOW_TO_RECOVER_DATA.html

Ransom Note
<!DOCTYPE html> <html> <head> <meta charset="utf-8"> <meta http-equiv="X-UA-Compatible" content="IE=Edge"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, user-scalable=yes"> <title>Title</title> <style> html, body, div, span, applet, object, iframe, h1, h2, h3, h4, h5, h6, p, blockquote, pre, a, abbr, acronym, address, big, cite, code, del, dfn, em, img, ins, kbd, q, s, samp, small, strike, strong, sub, sup, tt, var, b, u, i, center, dl, dt, dd, ol, ul, li, fieldset, form, label, legend, table, caption, tbody, tfoot, thead, tr, th, td, article, aside, canvas, details, embed, figure, figcaption, footer, header, hgroup, menu, nav, output, ruby, section, summary, time, mark, audio, video { margin: 0; padding: 0; border: 0; font-size: 100%; font: inherit; vertical-align: baseline; } /* HTML5 display-role reset for older browsers */ article, aside, details, figcaption, figure, footer, header, hgroup, menu, nav, section { display: block; } body { font-family: Tahoma, Arial; background: #717798; } .all { max-width: 1170px; margin: auto; background: #000; min-height: 100px; border-radius: 10px; } .tl { text-align: center; color: #e03930; font-family: Tahoma; font-size: 28px; font-weight: 700; position: relative; height: 60px; line-height: 60px; } .close { padding: 15px; width: 36px; height: 36px; position: absolute; right: 15px; top:0; } .bg { background: #252a42; text-align: center; color: #ffffff; padding: 25px 15px; font-size: 18px; font-weight: 400; line-height: 20px; } .bg span { color: #f25252; } .bg a { color: #9676fd; font-size: 20px; font-style: italic; text-decoration: none; line-height: 35px; } .bg c { color: #f25252; font-weight: 500; font-size: 20px; line-height: 35px;} .footer { padding: 15px 0; background: url("data:image/png;base64,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
Emails

href="mailto:[email protected]">[email protected]</a><br>

href="mailto:[email protected]">[email protected]</a>

URLs

http-equiv="X-UA-Compatible"

Extracted

Path

C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\RecoveryManual.html

Ransom Note
<html> <head> <title>RECOVERY MANUAL</title> </head> <body> <h1>Your ClientId:</h1> <b> <pre> aa0a8ea69e22c4a789b451ab4101d8502381aa01c1b61ac2e00577a9cc00a12f </pre> </b> <hr/> <b>/!\ YOUR NETWORK HAS BEEN HACKED /!\<br> All your important files have been encrypted!</b><br> <hr/> Your files are safe! Only encrypted.<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> You can send us 2-3 files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> Also we gathered highly confidential/personal data from your network. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you won't pay, we will release your data to public or reseller.<br> So you can expect your data to be published or improperly used in the near future.<br> In this case you will face all legal and reputational consequences of the leak.<br> We only desire to get a ransom and we don't aim to damage your reputation or destroy<br> your business.<br><br> <hr/> <b>Contact us to discuss your next step.</b><br><br> <a href="http://soxbhgx23tabwh2k447b2tljcu5tktdc2elmi2ls7huzntrhknygxsqd.onion/?cid=aa0a8ea69e22c4a789b451ab4101d8502381aa01c1b61ac2e00577a9cc00a12f">http://soxbhgx23tabwh2k447b2tljcu5tktdc2elmi2ls7huzntrhknygxsqd.onion/?cid=aa0a8ea69e22c4a789b451ab4101d8502381aa01c1b61ac2e00577a9cc00a12f</a><br> * Note that this server is only available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open "http://soxbhgx23tabwh2k447b2tljcu5tktdc2elmi2ls7huzntrhknygxsqd.onion/?cid=aa0a8ea69e22c4a789b451ab4101d8502381aa01c1b61ac2e00577a9cc00a12f". <br> 4. Start a chat and follow the further instructions. (Password field should be empty for the first login). <br><br> <hr/> <b>If you can`t use the above link, use the email:</b><br> <a href="mailto:[email protected]">[email protected]</a><br> Please note, sometimes our support is away from keyboard, but we will reply shortly.<br> Kindly advise you to contact us as soon as possible.<br></b><br> </body> </html>
Emails

href="mailto:[email protected]">[email protected]</a><br>

Extracted

Path

C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\RecoveryManual.html

Ransom Note
<html> <head> <title>RECOVERY MANUAL</title> </head> <body> <h1>Your ClientId:</h1> <b> <pre> aa0a8ea69e22c4a789b451ab4101d8502b9aaa0bcfa306d4e00577a9cc00a173 </pre> </b> <hr/> <b>/!\ YOUR NETWORK HAS BEEN HACKED /!\<br> All your important files have been encrypted!</b><br> <hr/> Your files are safe! Only encrypted.<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> You can send us 2-3 files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> Also we gathered highly confidential/personal data from your network. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you won't pay, we will release your data to public or reseller.<br> So you can expect your data to be published or improperly used in the near future.<br> In this case you will face all legal and reputational consequences of the leak.<br> We only desire to get a ransom and we don't aim to damage your reputation or destroy<br> your business.<br><br> <hr/> <b>Contact us to discuss your next step.</b><br><br> <a href="http://soxbhgx23tabwh2k447b2tljcu5tktdc2elmi2ls7huzntrhknygxsqd.onion/?cid=aa0a8ea69e22c4a789b451ab4101d8502b9aaa0bcfa306d4e00577a9cc00a173">http://soxbhgx23tabwh2k447b2tljcu5tktdc2elmi2ls7huzntrhknygxsqd.onion/?cid=aa0a8ea69e22c4a789b451ab4101d8502b9aaa0bcfa306d4e00577a9cc00a173</a><br> * Note that this server is only available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open "http://soxbhgx23tabwh2k447b2tljcu5tktdc2elmi2ls7huzntrhknygxsqd.onion/?cid=aa0a8ea69e22c4a789b451ab4101d8502b9aaa0bcfa306d4e00577a9cc00a173". <br> 4. Start a chat and follow the further instructions. (Password field should be empty for the first login). <br><br> <hr/> <b>If you can`t use the above link, use the email:</b><br> <a href="mailto:[email protected]">[email protected]</a><br> Please note, sometimes our support is away from keyboard, but we will reply shortly.<br> Kindly advise you to contact us as soon as possible.<br></b><br> </body> </html>
Emails

href="mailto:[email protected]">[email protected]</a><br>

Extracted

Path

C:\Program Files\7-Zip\Lang\RecoveryManual.html

Ransom Note
<html> <head> <title>RECOVERY MANUAL</title> </head> <body> <h1>Your ClientId:</h1> <b> <pre> aa0a8ea69e22c4a789b451ab4101d850238ea204ccb101d4e00577a9cc00a140 </pre> </b> <hr/> <b>/!\ YOUR NETWORK HAS BEEN HACKED /!\<br> All your important files have been encrypted!</b><br> <hr/> Your files are safe! Only encrypted.<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> You can send us 2-3 files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> Also we gathered highly confidential/personal data from your network. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you won't pay, we will release your data to public or reseller.<br> So you can expect your data to be published or improperly used in the near future.<br> In this case you will face all legal and reputational consequences of the leak.<br> We only desire to get a ransom and we don't aim to damage your reputation or destroy<br> your business.<br><br> <hr/> <b>Contact us to discuss your next step.</b><br><br> <a href="http://soxbhgx23tabwh2k447b2tljcu5tktdc2elmi2ls7huzntrhknygxsqd.onion/?cid=aa0a8ea69e22c4a789b451ab4101d850238ea204ccb101d4e00577a9cc00a140">http://soxbhgx23tabwh2k447b2tljcu5tktdc2elmi2ls7huzntrhknygxsqd.onion/?cid=aa0a8ea69e22c4a789b451ab4101d850238ea204ccb101d4e00577a9cc00a140</a><br> * Note that this server is only available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open "http://soxbhgx23tabwh2k447b2tljcu5tktdc2elmi2ls7huzntrhknygxsqd.onion/?cid=aa0a8ea69e22c4a789b451ab4101d850238ea204ccb101d4e00577a9cc00a140". <br> 4. Start a chat and follow the further instructions. (Password field should be empty for the first login). <br><br> <hr/> <b>If you can`t use the above link, use the email:</b><br> <a href="mailto:[email protected]">[email protected]</a><br> Please note, sometimes our support is away from keyboard, but we will reply shortly.<br> Kindly advise you to contact us as soon as possible.<br></b><br> </body> </html>
Emails

href="mailto:[email protected]">[email protected]</a><br>

Extracted

Path

C:\Program Files\7-Zip\Lang\RecoveryManual.html

Ransom Note
<html> <head> <title>RECOVERY MANUAL</title> </head> <body> <h1>Your ClientId:</h1> <b> <pre> aa0a8ea69e22c4a789b451ab4101d8502d87a204d2bf1bd2e00577a9cc00a15f </pre> </b> <hr/> <b>/!\ YOUR NETWORK HAS BEEN HACKED /!\<br> All your important files have been encrypted!</b><br> <hr/> Your files are safe! Only encrypted.<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> You can send us 2-3 files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> Also we gathered highly confidential/personal data from your network. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you won't pay, we will release your data to public or reseller.<br> So you can expect your data to be published or improperly used in the near future.<br> In this case you will face all legal and reputational consequences of the leak.<br> We only desire to get a ransom and we don't aim to damage your reputation or destroy<br> your business.<br><br> <hr/> <b>Contact us to discuss your next step.</b><br><br> <a href="http://soxbhgx23tabwh2k447b2tljcu5tktdc2elmi2ls7huzntrhknygxsqd.onion/?cid=aa0a8ea69e22c4a789b451ab4101d8502d87a204d2bf1bd2e00577a9cc00a15f">http://soxbhgx23tabwh2k447b2tljcu5tktdc2elmi2ls7huzntrhknygxsqd.onion/?cid=aa0a8ea69e22c4a789b451ab4101d8502d87a204d2bf1bd2e00577a9cc00a15f</a><br> * Note that this server is only available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open "http://soxbhgx23tabwh2k447b2tljcu5tktdc2elmi2ls7huzntrhknygxsqd.onion/?cid=aa0a8ea69e22c4a789b451ab4101d8502d87a204d2bf1bd2e00577a9cc00a15f". <br> 4. Start a chat and follow the further instructions. (Password field should be empty for the first login). <br><br> <hr/> <b>If you can`t use the above link, use the email:</b><br> <a href="mailto:[email protected]">[email protected]</a><br> Please note, sometimes our support is away from keyboard, but we will reply shortly.<br> Kindly advise you to contact us as soon as possible.<br></b><br> </body> </html>
Emails

href="mailto:[email protected]">[email protected]</a><br>

Extracted

Path

C:\Program Files\7-Zip\Lang\RecoveryManual.html

Ransom Note
<html> <head> <title>RECOVERY MANUAL</title> </head> <body> <h1>Your ClientId:</h1> <b> <pre> aa0a8ea69e22c4a789b451ab4101d850228eba0adcb510d2e00577a9cc00a142 </pre> </b> <hr/> <b>/!\ YOUR NETWORK HAS BEEN HACKED /!\<br> All your important files have been encrypted!</b><br> <hr/> Your files are safe! Only encrypted.<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> You can send us 2-3 files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> Also we gathered highly confidential/personal data from your network. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you won't pay, we will release your data to public or reseller.<br> So you can expect your data to be published or improperly used in the near future.<br> In this case you will face all legal and reputational consequences of the leak.<br> We only desire to get a ransom and we don't aim to damage your reputation or destroy<br> your business.<br><br> <hr/> <b>Contact us to discuss your next step.</b><br><br> <a href="http://soxbhgx23tabwh2k447b2tljcu5tktdc2elmi2ls7huzntrhknygxsqd.onion/?cid=aa0a8ea69e22c4a789b451ab4101d850228eba0adcb510d2e00577a9cc00a142">http://soxbhgx23tabwh2k447b2tljcu5tktdc2elmi2ls7huzntrhknygxsqd.onion/?cid=aa0a8ea69e22c4a789b451ab4101d850228eba0adcb510d2e00577a9cc00a142</a><br> * Note that this server is only available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open "http://soxbhgx23tabwh2k447b2tljcu5tktdc2elmi2ls7huzntrhknygxsqd.onion/?cid=aa0a8ea69e22c4a789b451ab4101d850228eba0adcb510d2e00577a9cc00a142". <br> 4. Start a chat and follow the further instructions. (Password field should be empty for the first login). <br><br> <hr/> <b>If you can`t use the above link, use the email:</b><br> <a href="mailto:[email protected]">[email protected]</a><br> Please note, sometimes our support is away from keyboard, but we will reply shortly.<br> Kindly advise you to contact us as soon as possible.<br></b><br> </body> </html>
Emails

href="mailto:[email protected]">[email protected]</a><br>

Targets

    • Target

      RansomwareSamples/MAKOP_27_10_2020_115KB.exe

    • Size

      114KB

    • MD5

      b33e8ce6a7035bee5c5472d5b870b68a

    • SHA1

      783d08fe374f287a4e0412ed8b7f5446c6e65687

    • SHA256

      2b5a3934d3e81fee4654bb1a7288c81af158a6d48a666cf8e379b0492551188f

    • SHA512

      78c36e1f8ba968d55e8b469fba9623bd20f9d7216b4f5983388c32be564484caab228935f96fd8bff82bc8bb8732f7beb9ccede50385b6b6ba7e23b5cc60679f

    • SSDEEP

      3072:Rf1BDZ0kVB67Duw9AMcUTeQnbZ7pgHzL8O1oc8rEUvZfqv8dOWVIc:R9X0GGZpYzL8VcFUvZyUdb

    • Makop

      Ransomware family discovered by @VK_Intel in early 2020.

    • Makop family

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (8315) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Deletes backup catalog

      Uses wbadmin.exe to inhibit system recovery.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

    • Target

      RansomwareSamples/MedusaLocker_24_04_2020_661KB.exe

    • Size

      661KB

    • MD5

      19ddac9782acd73f66c5fe040e86ddee

    • SHA1

      24ceba1e2951cde8e41939da21c6ba3030fc531d

    • SHA256

      dde3c98b6a370fb8d1785f3134a76cb465cd663db20dffe011da57a4de37aa95

    • SHA512

      e7be7472241fdd26db48dbd0311afe821905f6d59dfb56e3dc035944b7346b0767a8af76d110c5f60c0ba0183ca3791e56d9b3c8b9ba887afa111aafc949c1d4

    • SSDEEP

      12288:vN3K5e8nbwFigzk6VVMqX8aQNRMcauV9B/rtiPnA40Q8:hCXbwFigzkQVdXvlcayDh49

    • MedusaLocker

      Ransomware with several variants first seen in September 2019.

    • MedusaLocker payload

    • Medusalocker family

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (163) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Target

      RansomwareSamples/MountLocker_20_11_2020_200KB.exe

    • Size

      200KB

    • MD5

      c2671bf5b5dedbfd3cfe3f0f944fbe01

    • SHA1

      da3e830011e6f9d41dd6c93fdb48c47c1c6e35e1

    • SHA256

      226a723ffb4a91d9950a8b266167c5b354ab0db1dc225578494917fe53867ef2

    • SHA512

      256bc8582cc9b53b3cf9307a2882117476648ab9df540d501fc5f46a4030beacab9df2019f2d83b0a63d510803cbf6cbae01dc1325588f93a1a74521a07fe4d9

    • SSDEEP

      1536:ssBoz9GFuIdclwKfVPoawSL20mRbg2DrE1mHkrY0f3r6fR0ZzDWR+3itGSh6ZVvg:ssS3oifBoaXhDWA4G3eeJaeIbmC00

    • MountLocker Ransomware

      Ransomware family first seen in late 2020, which threatens to leak files if ransom is not paid.

    • Mountlocker family

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Deletes itself

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Target

      RansomwareSamples/Nefilim_31_08_2020_3061KB.exe

    • Size

      3.0MB

    • MD5

      cd7b5d2391af7cc10f5ab11f2baef503

    • SHA1

      c735ff582ab489f13cfc76ee744e52b868012e2e

    • SHA256

      0bafde9b22d7147de8fdb852bcd529b1730acddc9eb71316b66c180106f777f5

    • SHA512

      b01c843c9a7c154ab592b667fe66b49123bfc2218904391600c1d17623b91c4e83eb6049aba01813586251596d999cce953ca689957390e658ee306a9859adca

    • SSDEEP

      24576:YOXKA8qDbjm8N3CNWYqdQCVzCYXjG9xLAW0bUXo2xdQS3aVOqL1UrSlcbHLWcR4+:tXKOm8mkdHJC0jG9xE9gdQS3aLibLw

    Score
    9/10
    • Renames multiple (157) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Target

      RansomwareSamples/Nemty_03_02_2021_124KB.exe

    • Size

      123KB

    • MD5

      78c3c27df6232caa15679c6b72406799

    • SHA1

      e439d28b6bb6fd449bddad9cf36c97433a363aed

    • SHA256

      a2fe2942436546be34c1f83639f1624cae786ab2a57a29a75f27520792cbf3da

    • SHA512

      36dcdaffaef3ea2136cca3386f18ee3f6462aa66c82ef64660e3c300f3d58720a9c742930e2ee8e94c2379fbc7b3e6932dda20b5caa30b1c1f1ef38095aac6f6

    • SSDEEP

      3072:xlwfdbiGnmYcAbwc7HNXG8/IEjkeOBeFtEv9VTYnH5upMocGMn7qxR1tMkTJNzn:DwfY2sA0kHFkktN5upMocGMns/lNzn

    Score
    9/10
    • Renames multiple (120) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Target

      RansomwareSamples/NetWalker_19_10_2020_903KB.ps1

    • Size

      902KB

    • MD5

      7770c598848339cf3562b7480856d584

    • SHA1

      b3d39042aab832b7d2bed732c8b8e600a4cf5197

    • SHA256

      ee3b0468a16789da8706d46aa361049ec51586c36899646a596b630d913e7304

    • SHA512

      02af6d5910f0627074fbea72901b2f2b491f7dba58f53ae1fad1dc47230e000a7b459c8475a76aaf006629bb5822d89d4672d32fb64d073464ca41140cb134d2

    • SSDEEP

      6144:KxYcCQ2x63Ib0NQrqxpPbI1ZVedvUhwDNGjG+zBumDKemdglhykA:KCQ2x6TdvUqDUjG+zBumDKemdgy9

    • Netwalker Ransomware

      Ransomware family with multiple versions. Also known as MailTo.

    • Netwalker family

    • Renames multiple (930) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

MITRE ATT&CK Enterprise v15

Tasks

static1

pyinstaller512478c08dada2af19e49808fbda5b0bupxcryptonepacker$2a$10$kmb3nsvqxc.93gyncgky/uq9hyhivf0e3hcajfiifr8hf3fmnofgm7258$2a$10$dfjplrxudytff.kmytq1rogsxjtjee8emqt65ftxltpjtxpzrhsaq7178blackmattermedusalockermespinozasodinokibi
Score
10/10

behavioral1

discovery
Score
7/10

behavioral2

makopdefense_evasiondiscoveryexecutionimpactpersistenceransomwarespywarestealer
Score
10/10

behavioral3

discovery
Score
7/10

behavioral4

discovery
Score
7/10

behavioral5

discovery
Score
7/10

behavioral6

medusalockerdefense_evasiondiscoveryransomwarespywarestealertrojan
Score
10/10

behavioral7

medusalockerdefense_evasiondiscoveryexecutionimpactransomwarespywarestealertrojan
Score
10/10

behavioral8

medusalockerdefense_evasiondiscoveryransomwarespywarestealertrojan
Score
10/10

behavioral9

medusalockerdefense_evasiondiscoveryransomwarespywarestealertrojan
Score
10/10

behavioral10

medusalockerdefense_evasiondiscoveryransomwarespywarestealertrojan
Score
10/10

behavioral11

mountlockerdefense_evasiondiscoveryexecutionimpactransomware
Score
10/10

behavioral12

mountlockerdefense_evasiondiscoveryexecutionimpactransomware
Score
10/10

behavioral13

mountlockerdiscoveryexecutionransomware
Score
10/10

behavioral14

mountlockerdiscoveryexecutionransomware
Score
10/10

behavioral15

mountlockerdiscoveryexecutionransomware
Score
10/10

behavioral16

ransomware
Score
9/10

behavioral17

ransomware
Score
9/10

behavioral18

ransomware
Score
9/10

behavioral19

ransomware
Score
9/10

behavioral20

ransomware
Score
9/10

behavioral21

discoveryransomware
Score
9/10

behavioral22

ransomware
Score
9/10

behavioral23

discoveryransomware
Score
9/10

behavioral24

discoveryransomware
Score
9/10

behavioral25

discoveryransomware
Score
9/10

behavioral26

netwalkerexecutionransomware
Score
10/10

behavioral27

netwalkerexecutionransomware
Score
10/10

behavioral28

netwalkerexecutionransomware
Score
10/10

behavioral29

netwalkerexecutionransomware
Score
10/10

behavioral30

netwalkerexecutionransomware
Score
10/10