General

  • Target

    Ransomware.exe

  • Size

    77KB

  • Sample

    250327-fs3mfazlw3

  • MD5

    559b0d30b7bbf2d514c01e275fadbc90

  • SHA1

    25f2a1d11717d9127ced536d89caeb0c54edad26

  • SHA256

    d196d67dbaa312f08d963d404d4237eed1cbb708168f732893dbf91d85d3d493

  • SHA512

    ac3e6b24416812f2cdf54f1131d5235ce47481bd5336029f6ff1dd4b292eba33d1c33c07949c0f197166bc438fad66a773aebc989d31a4d65d2c86e449d89727

  • SSDEEP

    1536:5Ni6hsq9licc1/auzQX3unCfjiKG19ukYlUSaL7TOiwjJ:uisq9l/cVMTi1skYlURPR6J

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SPECTRARANSOMWARE.txt

Ransom Note
CONFIDENTIAL AND URGENT To the Management and IT Department of your company, You are now faced with a critical situation. Your company's digital assets, including sensitive data, financial records, and intellectual property, have been compromised. Our group has successfully infiltrated your network, exploiting vulnerabilities that your security measures failed to address. As a result, we have encrypted all accessible data, rendering it inaccessible to your organization. The encryption method used is highly sophisticated, and decryption without our provided key is virtually impossible. Your attempts to restore from backups will be futile, as we have also compromised your backup systems. The following data has been encrypted and is currently being held for ransom: Financial records, including invoices, payments, and accounting data Sensitive customer information, including personal identifiable data Proprietary software and intellectual property Email communications and internal memos Database files, including SQL and NoSQL data We are willing to provide the decryption key in exchange for a payment of $5000 in Bitcoin. This amount is non-negotiable, and any attempts to bargain or delay payment will result in the permanent deletion of your data. You have 72 hours to comply with our demands. Failure to pay the ransom within the specified timeframe will result in: 1. Permanent deletion of your encrypted data 2. Public release of sensitive customer information 3. Disclosure of your company's security vulnerabilities to the public and competitors 4. Initiation of a targeted attack on your remaining infrastructure To facilitate the payment process, we have provided a Bitcoin wallet address below: bc1q88r38gk8ynrhdfur7yefwf5hrn2y56s90vlrvq Once the payment is confirmed, we will provide the decryption key and instructions on how to restore your data. Please note that any attempts to involve law enforcement or cybersecurity firms will be detected, and we will take immediate action to destroy your data. You are advised to take this situation seriously and act promptly to avoid any further consequences. We are monitoring your company's activities closely and will respond accordingly. DO NOT IGNORE THIS MESSAGE Your company's future depends on your prompt response to this situation. We expect your cooperation and payment within the specified timeframe. Sincerely, Spectra Ransomware

Targets

    • Target

      Ransomware.exe

    • Size

      77KB

    • MD5

      559b0d30b7bbf2d514c01e275fadbc90

    • SHA1

      25f2a1d11717d9127ced536d89caeb0c54edad26

    • SHA256

      d196d67dbaa312f08d963d404d4237eed1cbb708168f732893dbf91d85d3d493

    • SHA512

      ac3e6b24416812f2cdf54f1131d5235ce47481bd5336029f6ff1dd4b292eba33d1c33c07949c0f197166bc438fad66a773aebc989d31a4d65d2c86e449d89727

    • SSDEEP

      1536:5Ni6hsq9licc1/auzQX3unCfjiKG19ukYlUSaL7TOiwjJ:uisq9l/cVMTi1skYlURPR6J

    • Chaos

      Ransomware family first seen in June 2021.

    • Chaos Ransomware

    • Chaos family

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies boot configuration data using bcdedit

    • Deletes backup catalog

      Uses wbadmin.exe to inhibit system recovery.

    • Disables Task Manager via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks