VRad

#babuk_260122

Jan 26th, 2022 (edited)
569
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.91 KB | None | 0 0
  1. #IOC #OptiData #VR #Babuk #Ransomware
  2.  
  3. https://pastebin.com/EfB83dwk
  4.  
  5. previous_contact: n/a
  6.  
  7. FAQ:
  8. https://malpedia.caad.fkie.fraunhofer.de/details/win.babuk
  9.  
  10. attack_vector
  11. --------------
  12. n/a
  13.  
  14. email_headers
  15. --------------
  16. n/a
  17.  
  18. # # # # # # # #
  19. files
  20. # # # # # # # #
  21.  
  22. SHA-256 4deaecd165abd8afefcaf0efd268f52fc6aa3904223bdccfb82dede849e01a44
  23. File name vpndeamon.exe (Grinch.exe) [PE32 executable for MS Windows]
  24. File size 134.32 KB (137544 bytes)
  25.  
  26. SHA-256 1049bafd1648b6cfd6563e77c9301974b1e24b0486e5f2531f2479dd645ae602
  27. File name kings.exe [ PE32 executable for MS Windows]
  28. File size 72.50 KB (74240 bytes)
  29.  
  30.  
  31. # # # # # # # #
  32. activity
  33. # # # # # # # #
  34. PL_SCR -no network connections-
  35.  
  36. C2 -no network connections-
  37.  
  38.  
  39. netwrk
  40. --------------
  41. -no network connections-
  42.  
  43. comp
  44. --------------
  45. -no network connections-
  46.  
  47. proc
  48. --------------
  49. C:\Users\operator\Desktop\vpndeamon.exe
  50. C:\tmp\kings.exe SW_SHOWNORMAL
  51. C:\Windows\System32\cmd.exe /c vssadmin.exe delete shadows /all /quiet
  52. C:\Windows\system32\vssadmin.exe delete shadows /all /quiet
  53. C:\Windows\System32\cmd.exe /c vssadmin.exe delete shadows /all /quiet
  54. C:\Windows\system32\vssadmin.exe delete shadows /all /quiet
  55.  
  56. {repeat many times, even under Aadmin account - maybe config error}
  57.  
  58. C:\tmp\kings.exe SW_SHOWNORMAL
  59. C:\Windows\System32\cmd.exe /c vssadmin.exe delete shadows /all /quiet
  60. C:\Windows\system32\vssadmin.exe delete shadows /all /quiet
  61. C:\Windows\System32\cmd.exe /c vssadmin.exe delete shadows /all /quiet
  62. C:\Windows\system32\vssadmin.exe delete shadows /all /quiet
  63.  
  64. persist
  65. --------------
  66. n/a
  67.  
  68. drop
  69. --------------
  70. %temp%\kings.exe
  71. %any folder or disk%\RestoreFiles.txt
  72.  
  73. # # # # # # # #
  74. additional info
  75. # # # # # # # #
  76.  
  77. Ransom note - RestoreFiles.txt
  78. ------------------------------
  79. << Hello, friends! >>
  80. > Your system has been compromised by our team. > We have blocked your files and also uploaded useful data from your computers(doc, docx, pdf, xls and other office extensions) to our servers.
  81. > You have 2 days to contact us to discuss the terms of payment for our services to restore your files. If you do not contact us or refuse to pay, we will place your stolen files in the public domain.
  82. > Do not change the file namesand extensions. Do not try to decrypt the files yourself, they are encrypted using a good encryption algorithm.
  83. > Main Mail:
  84. > Backup mail(if we don't reply 24 hours):
  85. > At the first contact, you can write to both emails for reliability.
  86.  
  87.  
  88. Original File Sample [11.txt]
  89. ------------------------------
  90. 
  91. Get-WmiObject -class Win32_ComputerSystem
  92. Get-WmiObject -class Win32_BIOS
  93. Get-WmiObject -class Win32_DiskDrive
  94.  
  95. mofcomp C:\Windows\System32\wbem\cimwin32.mof
  96. mofcomp hideVM.mof
  97.  
  98. # # # #
  99.  
  100. Check services:
  101. Get-Service -DisplayName *virtual*
  102.  
  103. Check devices:
  104. Get-WmiObject -class Win32_PnPEntity | Select Name
  105.  
  106.  
  107. Modified File Sample [11.txt.kings]
  108. ------------------------------
  109. J
  110. ¬¡äÙXÑNÉ7ÖY¯ýŽÿ WB€Ï1…:2~zComputerSystem
  111. Get-WmiObject -class Win32_BIOS
  112. Get-WmiObject -class Win32_DiskDrive
  113.  
  114. mofcomp C:\Windows\System32\wbem\cimwin32.mof
  115. mofcomp hideVM.mof
  116.  
  117. # # # #
  118.  
  119. Check services:
  120. Get-Service -DisplayName *virtual*
  121.  
  122. Check devices:
  123. Get-WmiObject -class Win32_PnPEntity | Select Name
  124. bBVÒX’¹QÅ1þs˜xDxìa±¬Ã®ÙúÞä— —?¯ÉÎ8Fw yap yap yap yap yap yap yap yap
  125.  
  126.  
  127. # # # # # # # #
  128. VT & Intezer
  129. # # # # # # # #
  130. https://www.virustotal.com/gui/file/4deaecd165abd8afefcaf0efd268f52fc6aa3904223bdccfb82dede849e01a44/details
  131. https://www.virustotal.com/gui/file/1049bafd1648b6cfd6563e77c9301974b1e24b0486e5f2531f2479dd645ae602/detection
  132. https://analyze.intezer.com/analyses/1c6235d0-9525-4457-b63b-ef7fccf4bd2d/dynamic-ttps
  133. https://analyze.intezer.com/analyses/a6d87137-6073-4717-9b84-3fdef02bbccf/dynamic-ttps
  134.  
  135. VR
  136.  
Add Comment
Please, Sign In to add comment