Resubmissions

22/04/2025, 00:36

250422-ax1ezsspx8 10

20/12/2023, 14:34

231220-rxf5sacehm 10

General

  • Target

    New Text Document mod.exse.exe

  • Size

    8KB

  • Sample

    250422-ax1ezsspx8

  • MD5

    69994ff2f00eeca9335ccd502198e05b

  • SHA1

    b13a15a5bea65b711b835ce8eccd2a699a99cead

  • SHA256

    2e2e035ece4accdee838ecaacdc263fa526939597954d18d1320d73c8bf810c2

  • SHA512

    ced53147894ed2dfc980bcb50767d9734ba8021f85842a53bb4bb4c502d51b4e9884f5f74c4dd2b70b53cafbe2441376675f7bd0f19bb20a3becb091a34fb9f3

  • SSDEEP

    96:y7ov9wc1dN1Unh3EHJ40CUJCrQt0LpCBIW12nEtgpH9GIkQYQoBNw9fnmK5iLjTv:yZyTFJfCB20LsBIW12n/eIkQ2BNg5S1

Malware Config

Extracted

Path

C:\RSN6Lzcyg.README.txt

Ransom Note
Rans0m Resp0nse R|R The World's Greatest Ransomware >>>> If you are reading this then we are sorry to inform you that you are the Victim of the most sophisticated Ransomeware Malware on the planet. Every single file document and all data on your systems has now been encrypted with military grade encryption. Also We have made copies of ALL file systems and uploaded this data to our servers. Thankfully for you we have the one and only way to restore all of your files back to normal like this never happened and that way is with our decryptor program and decryption keys. In order for us to allow you to have everything back and restored including all of your files and a promise we will never leak or sell the data we have stored on our servers all you need to do is pay 4800 USD worth of the Cryptocurrency Bitcoin. So just purchase Bitcoin four thousand eight hundred dollars worth and then send the bitcoin to the following Bitcoin Wallet Address bc1qarhtk9c2krzaaak9way0nuuac87mnuya8cpf4x You have 72 hours from reading this message to pay the 4800 USD in bitcoin to the wallet address above or we will assume you are not cooperating and will sell ALL of your data to other CyberCrime Groups Business Competitors and Anyone else who would love to pay money for it. Failing to pay not only gets your data leaked and sold but we will continue to impose cyber attacks on every system you have. We can promise you it is in your best interest to pay the small amount and have all your files restored within 10 minutes of paying us. If for some reason you need to contact us you can do so over TOX client just go to the website tox.chat and download it. Once you make a username and login to TOX you can then message us via our TOX ID which is as follows CB7D4BE06A39B950378A56201A5FD59EF7A4EE62D74E8ADE7C1F47745E070A4A4AD46389FFB2 >>>> What guarantees that we will not deceive you? We are not a politically motivated group and we do not need anything other than your money. AFter you pay we will provide you the programs for decryption along with the keys and we will delete your data. Life is too short to be sad. Be not sad money it is only paper. If we do not give decryptor and keys after payment or we do not delete your data after payment then nobody will pay us in the future. Therefore our reputation is very important to us. We attack the companies worldwide and there is no dissatisfied victim after payment. >>>> Warning! Do not DELETE or MODIFY any files it can lead to recovery problems! >>>> Warning! If you do not pay the ransom we will attack your company repeatedly again

Targets

    • Target

      New Text Document mod.exse.exe

    • Size

      8KB

    • MD5

      69994ff2f00eeca9335ccd502198e05b

    • SHA1

      b13a15a5bea65b711b835ce8eccd2a699a99cead

    • SHA256

      2e2e035ece4accdee838ecaacdc263fa526939597954d18d1320d73c8bf810c2

    • SHA512

      ced53147894ed2dfc980bcb50767d9734ba8021f85842a53bb4bb4c502d51b4e9884f5f74c4dd2b70b53cafbe2441376675f7bd0f19bb20a3becb091a34fb9f3

    • SSDEEP

      96:y7ov9wc1dN1Unh3EHJ40CUJCrQt0LpCBIW12nEtgpH9GIkQYQoBNw9fnmK5iLjTv:yZyTFJfCB20LsBIW12n/eIkQ2BNg5S1

    • Lockbit

      Ransomware family with multiple variants released since late 2019.

    • Lockbit family

    • Mimikatz

      mimikatz is an open source tool to dump credentials on Windows.

    • Mimikatz family

    • Rule to detect Lockbit 3.0 ransomware Windows payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Renames multiple (1324) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • mimikatz is an open source tool to dump credentials on Windows

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v16

Tasks