General

  • Target

    sekhmet1.zip

  • Size

    309KB

  • Sample

    201001-ymk5zevjns

  • MD5

    3d65ccec9490c62489c8afc4920fae54

  • SHA1

    82785bb06e2d394baf11cc286ced6abb0f269c32

  • SHA256

    91449c65dac560daec4e14454a4e8e1407da0e0ae52ff4a2cfc227a7ba088720

  • SHA512

    ebe49983d318482e51b4b418abca622f564019be84b83ee47216a3bfeb1d4f0ae83755b09fefa757263653bb4ad3d9f2595b55f76e06a760ad1365346fa59541

Malware Config

Extracted

Path

C:\RECOVER-FILES.txt

Family

sekhmet

Ransom Note
-------------- | Attention! | -------------- Your company network has been hacked and breached. We downloaded confidential and private data. In case of not contacting us in 3 business days this data will be published on a special website available for public view. Also we had executed a special software that turned files, databases and other important data in your network into an encrypted state using RSA-2048 and ChaCha algorithms. A special key is required to decrypt and restore these files. Only we have this key and only we can give it to you with a reliable decryption software. --------------------------------------- | How to contact us and be safe again | --------------------------------------- The only method to restore your files and be safe from data leakage is to purchase a private key which is unique for you and securely stored on our servers. After the payment we provide you with decryption software that will decrypt all your files, also we remove the downloaded data from your network and never post any information about you. There are 2 ways to directly contact us: 1) Using hidden TOR network: a) Download a special TOR browser: https://www.torproject.org/ b) Install the TOR browser c) Open our website in the TOR browser: http://o3n4bhhtybbtwqqs.onion/735A8A41D889C83A d) Follow the instructions on this page. 2) If you have any problems connecting or using TOR network a) Open our website: https://sekhmet.top/735A8A41D889C83A b) Follow the instructions on this page On this web site, you will get instructions on how to make a free decryption test and how to pay. Also it has a live chat with our operators and support team. ----------------------- |Questions and answers| ----------------------- We understand you may have questions, so we provide here answers to the frequently asked questions. ==== Q: What about decryption guarantees? A: You have a FREE opportunity to test a service by instantly decrypting for free 3 files from every system in your network. If you have any problems our friendly support team is always here to assist you in a live chat. ==== ==== Q: How can we be sure that after the payment data is removed and not published or used in any nefarious ways? A: We can assure you, downloaded data will be securely removed using DoD 5220.22-M wiping standart. We are not interested in keeping this data as we do not gain any profit from it. This data is used only to leverage you to make a payment and nothing more. On the market the data itself are relatively useless and cheap. Also we perfectly understand that using or publishing this data after the payment will compromise our reliable business operations and we are not interested in it. ==== ==== Q: How did you get into the network? A: Detailed report on how we did it and how to fix your vulnerabilities can be provided by request after the payment. ==== -------------------------------------------------------------------------------------- This is techinal information we need to identify you correctly and give decryption key to you, do not redact! ---SEKHMET--- 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 ---SEKHMET---
URLs

http://o3n4bhhtybbtwqqs.onion/735A8A41D889C83A

https://sekhmet.top/735A8A41D889C83A

Extracted

Path

C:\RECOVER-FILES.txt

Family

sekhmet

Ransom Note
-------------- | Attention! | -------------- Your company network has been hacked and breached. We downloaded confidential and private data. In case of not contacting us in 3 business days this data will be published on a special website available for public view. Also we had executed a special software that turned files, databases and other important data in your network into an encrypted state using RSA-2048 and ChaCha algorithms. A special key is required to decrypt and restore these files. Only we have this key and only we can give it to you with a reliable decryption software. --------------------------------------- | How to contact us and be safe again | --------------------------------------- The only method to restore your files and be safe from data leakage is to purchase a private key which is unique for you and securely stored on our servers. After the payment we provide you with decryption software that will decrypt all your files, also we remove the downloaded data from your network and never post any information about you. There are 2 ways to directly contact us: 1) Using hidden TOR network: a) Download a special TOR browser: https://www.torproject.org/ b) Install the TOR browser c) Open our website in the TOR browser: http://o3n4bhhtybbtwqqs.onion/57F638FA87C356 d) Follow the instructions on this page. 2) If you have any problems connecting or using TOR network a) Open our website: https://sekhmet.top/57F638FA87C356 b) Follow the instructions on this page On this web site, you will get instructions on how to make a free decryption test and how to pay. Also it has a live chat with our operators and support team. ----------------------- |Questions and answers| ----------------------- We understand you may have questions, so we provide here answers to the frequently asked questions. ==== Q: What about decryption guarantees? A: You have a FREE opportunity to test a service by instantly decrypting for free 3 files from every system in your network. If you have any problems our friendly support team is always here to assist you in a live chat. ==== ==== Q: How can we be sure that after the payment data is removed and not published or used in any nefarious ways? A: We can assure you, downloaded data will be securely removed using DoD 5220.22-M wiping standart. We are not interested in keeping this data as we do not gain any profit from it. This data is used only to leverage you to make a payment and nothing more. On the market the data itself are relatively useless and cheap. Also we perfectly understand that using or publishing this data after the payment will compromise our reliable business operations and we are not interested in it. ==== ==== Q: How did you get into the network? A: Detailed report on how we did it and how to fix your vulnerabilities can be provided by request after the payment. ==== -------------------------------------------------------------------------------------- This is techinal information we need to identify you correctly and give decryption key to you, do not redact! ---SEKHMET--- FEjM+P/lEInjPsi9ptP8TByH62NdUtI4BHm7jBSCnJn6xV2EWAwmUzSdZZge/bChO84BlqJelJ66ilSyA++jU2LuQXX+897U/T5OrY31MSSFDhCsB8J1ubetP6SHzBYw4mgZnLdwDCNCxwV7nk/bUhCU6ftp9pgB9EqqN+E4GwZWMZM3aEp9VD7Tw/WQzCsan99C2BKez3w77vcQBNrw3JeJ0syxaYkGXlJ50uyOXBuumg2+QMz1cNZp9/+PI8gfbikPgFTPXvaM4CHaICGCNGzmS6+aD602ffG6+KD4WhRXYmhUt+NOubZWl/KRxt9WT24l51PwiTpb3cgAdp/wmoMKjaiNhIPlZ+f49LWkuP+VPhOB3nyi4ghUuj/Yozh+zPagTTC8kw9BbqP07sg70jvpXfRIWib2s/P6nOQmx39rLSdSEmZ1FP40gLRqyUMkDaVOkN8z6yretpVSf/q1ajlbR+1WxZm4SExfOxiDub3vjC3K/aXthr6VsbkTPZeCkntAzmz3C6JVWcbiMwffHmmv/Sts1S7ZRDmzdfB+mzWrvEIUq/5M64F9K8cqCqD2KnYtfBbav/CfZrkKxVRtwe3r0KH8N80G06FWy3xo9J13ZdJeTH+rC6SHhlMDiq6xfohzrCSYcTlBNxtqYDY3fL2UAJ0OyH0ZH1cxxvUru6E6oucrULl2pcz8DYYUz1ZWzI2aCGOdc/q0VJmTf64IXG32/oRihr8vJJCjF34nkAPSAraoGNI4wlCAIEJubgfGCUmvDGMk/ah6oP0JFDNI6DokCc06zces+zh6Ci98z+pamklcQXzYB6HLMAahB9d/DSP3M/i7zrgR3c5az9je9X1mKVKDEQzFr2uryIXXbtYucG6gEGEqGTXYLT2mjB1Fr9tljsThgSKrok1C38Na5KMXEIGiNaGmrTnbMpl55gTHMYRLXUeWcyvp5+t/ocuzSzvo00wgjPej7++DAnuYALIN4RgviqQhi4GY6Y9staA252YQasRt6XLg6QfFYDk/iA5UuyhMB5rvL8zfsqORkIyHzHgVqfshcCESgOaaR+Hc3xLHP1MwJ1M11iT0vCyQKwZcFzuMTkMsH6wDe9YNg7E4NfgXZUTli6ri6rq31FgwPHeuJoTbjUuM3FqfkDSCH9BVO3iZjmqxHKB2s+ApPrFPtglX2k5quMkprAlGmDZXkcUK9CDi+6EX367hBz/pZg/FWxoAvIp+OxwH/ilrd1OziPZqTGwHknsq50+duAUB9jgxvMTIon7J6CtdgDdESsopcE0TBgZezzhaH8NuzW10R8b7SERUFJx4SiFPD50/McIGkPIXC7PVuvQvGkVRtDUXUw7cbSi24XE4DSr/ppf65p20G6gnV5pBcnGvU8nHPAS7t6bC6UFmb2yjFO9V/fdqmqq6jZDM2nlC/gilIV5UEYIH8PYgTP4i+0cSw2AeL9KgaGIXEIrajOwWE+wTlDjZQ6PTwyzPRkRJMMjA2QAwheHTq8dvQkx1g3kWOdGdWFf1R30CATxO4v5WHwYxztzYvXwlcqhk1+6vnIUSrop4RGuoVPq35c/99IganfXi0Ufvh1tq40CX1rsdjCHm8NJ3/2P8mUFpj+Us+tLWFT2Yg9aPkJh45P2aM3uMSwOVg9WICm4oxJmhmwfwVNAuwKe4/azFPogmuDOdJcSQJE38370oUo2XnCbZW411Npxb0OpeOdd7FAWTagSN7lVZTgFcZjNbMICltIYAU5lbvubjCcansb2OHyctcIMsoGguem7K4bczxhC9BloCAdB7IVQVa/tqpkH33hF8ZRTRGA7jWqlN6dWcGN/Yn4XOmQP2sOJRYaFYVBdpV8CtgJOcWkIMKv6UgSF2iu2sjNeaWqtxgZpVqaN/prk8vKA0E6dc+mtNvODeJ6QDJ/hglcEJio9RAshiiMfei/hLF5CtoJIQ5utKXgf6/D9YKTRkO1TI7H7PfSamQnnmy2q7Z9dF85N5CByuRZo/ahYznA6L31rOD8wzO9DIfiUQJyFx7JsCBX81DTCkZlYxz3F9T3HT0kpF1lgQWLjNQtNLo4Zq3Htl4vM69/aTnOG5MlKqtw5zcbAcvHoFwB6NgDTmdPt55hXeDXw+3GMLXbWH3mrx7+RJXG3n8wxAO33CtEySYA6ZT9QbEgpymWXY7njJveMrOV92+CurjBGJ1z5uV/j2NmR6lTZwN6qXxQRZmed5Mlw689o1Oiv10uAg+xDkv4wYhZnlgQgBEAQYASAAKAA6EkwAWgBVAEsATABJAE8AVQAAAEIeNQA3AEYANgAzADgARgBBADgANwBDADMANQA2AAAASjh8AEMAOgBGAF8AMgA0ADQAMwAyADIALwAyADYAMgAwADQAMQB8AEQAOgBDAF8AMAAvADAAfAAAAFIMQQBkAG0AaQBuAAAAaAByHlcAaQBuAGQAbwB3AHMAIAAxADAAIABQAHIAbwAAAHoUVwBPAFIASwBHAFIATwBVAFAAAAA= ---SEKHMET---
URLs

http://o3n4bhhtybbtwqqs.onion/57F638FA87C356

https://sekhmet.top/57F638FA87C356

Targets

    • Target

      run.bat

    • Size

      74B

    • MD5

      387c29a2241aa206352b4154de2cfb3a

    • SHA1

      4d8140bafa23fe50bb8cd8048451c6e5a0c81a13

    • SHA256

      1577af8f986faa067ba9a0a9a90c445a110bd05f23936962432e0fba5d7d53f6

    • SHA512

      20a2870e70227534e2d0f5234443a1ee5511f201a05fcb0d57fefddf24d2e1faa03864114798c98c4161a30df576445ccec4b8e5eab3788d043889836d8b99dc

    • Sekhmet Ransomware

      Ransomware family active in the wild since early 2020.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Modifies service

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks