General

  • Target

    Payment_Activity_0037_2025-3-30.vbs

  • Size

    13KB

  • Sample

    250330-w6n9zawpx2

  • MD5

    257ea8ae99c0f328251eecebbb3c4301

  • SHA1

    0f6c115c4169c73269ee17955cd6858f71bd9b45

  • SHA256

    0d69c127cf01104b06b3407364bbd1c04ae5b6a831317b58d835c50ff9a0468c

  • SHA512

    631c1e004e71412b05bf1fb919d26d303a16c3cfbc5bf5e0fdf44533fbd8e47e4cd1ad1e00a39dfd038c51eceaf6bb19404eca49756a657b623b4acccda37b71

  • SSDEEP

    192:NB0v8qa258i+nxp2YXBoN8x6kgqDMOhWm3Gmim3jzVcGZlIyB1AQaAMKz3N2v:3qyiAdxoY6HyLjpLZlIyUQanKzN2v

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\Decrypt_files.txt

Ransom Note
ATTENTION! You can return your files! All your files are encrypted with a strong encryption algorithm and unique key. The only method of recovering files is to purchase a decrypt tool and key. Do not try to recover your files without a decrypt tool or try to turn off your pc, this may damage your files making them making them impossible to recover. We advise you contact us in less than 72 hours, otherwise there is a possibility that your files will never be returned. We will not wait for your letter for a long time, mail can be abused, we are moving on, hurry up with the decision. Check your email 'Spam' or 'Junk' folder if you don't get answer within 6 hours. Contact us email: [email protected] [email protected] ID :23516B6C87C78B696F866D7D93D40320E438124D8E9B9C150A1808AA29F2C677

Targets

    • Target

      Payment_Activity_0037_2025-3-30.vbs

    • Size

      13KB

    • MD5

      257ea8ae99c0f328251eecebbb3c4301

    • SHA1

      0f6c115c4169c73269ee17955cd6858f71bd9b45

    • SHA256

      0d69c127cf01104b06b3407364bbd1c04ae5b6a831317b58d835c50ff9a0468c

    • SHA512

      631c1e004e71412b05bf1fb919d26d303a16c3cfbc5bf5e0fdf44533fbd8e47e4cd1ad1e00a39dfd038c51eceaf6bb19404eca49756a657b623b4acccda37b71

    • SSDEEP

      192:NB0v8qa258i+nxp2YXBoN8x6kgqDMOhWm3Gmim3jzVcGZlIyB1AQaAMKz3N2v:3qyiAdxoY6HyLjpLZlIyUQanKzN2v

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Command and Scripting Interpreter: PowerShell

      Start PowerShell.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks