Skip to main content

DMALocker Ransomware - IOC


1) Ransomware Name - DMALocker

2) Encrypted Extensions - NA

3) Ransom Note File -
cryptinfo.txt
decrypting.txt
start.txt

4) Encrypted Algorithm -
AES(256) in ECB mode,
Version 2-4 also RSA

5) Decryptor Link -
https://decrypter.emsisoft.com/
https://github.com/hasherezade/dma_unlocker
https://drive.google.com/drive/folders/0Bzb5kQFOXkiSMm94QzdyM3hCdDg
https://decrypter.emsisoft.com/
https://github.com/hasherezade/dma_unlocker
https://drive.google.com/drive/folders/0Bzb5kQFOXkiSMm94QzdyM3hCdDg

6) Screenshots -


7) Indicators of Compromise -
e-mail: crypt302@gmx.com


8) File Details -
the MD5 745ae41840a3be2ed1732c2b6307a63f
the SHA1 a5d03bfb37b10b17c2922bd215f04b498b888176
the SHA256 9827c04d1170ed7b278185eb16610c74591b7769f88ed509fc4128845baaf20a
ssdeep1536: 9kR7Hlwjb5lBNHi + q3AotK9qdqeZ0Vd7ZskJizNfQKhJRCKjPc / bNsWh0Gu: 6RLWjbBNCTAdeCJJ8XJRdw / BJh0Gu
authentihash  e9214495f98efe9620b90e7fae4b55d7fa427fd8eefb572f8eeb7e1a6304d1e5
imphash  1faa1f41ff65fec472802847d7ad22ce
File size 201.5 KB (206,336 bytes)
Type of file Win32 EXE
DescriptionPE32 executable for MS Windows (console) Intel 80386 32-bit

the MD5 0cbe28ba2991696d6ad5dfa6bfc40f2e
the SHA1 25f80c9512845665e371f5923b639b9011c51e8e
the SHA256 9ffccc3a862274bd82bd4bb2cb176f7d907639369587bbc3c97aaac3e73af696
ssdeep1536: 9kR7Hlwjb5lBNHi + q3AotK9qdqeZ0Vd7ZskJizNfQKhJRCKjPc / bNsWh0Gu: 6RLWjbBNCTAdeCJJ8XJRdw / BJh0Gu
authentihash  076a3c8b5567d0daac0466e153cf4c8d278a0b9988cc7cf07d6db2e678784532
imphash  1faa1f41ff65fec472802847d7ad22ce
File size 201.5 KB (206,336 bytes)
Type of file Win32 EXE
DescriptionPE32 executable for MS Windows (console) Intel 80386 32-bit

Comments

Popular posts from this blog

Locked-In Ransomware - IOC - File Details

1) Ransomware Name - Locked-In

2) Encrypted Extensions - .novalid

3) Ransom note File -
RESTORE_CORUPTED_FILES.HTML
RESTORE_NOVALID_FILES.HTML

4) Encrypted Algorithm - AES-256

5) Decryptor Link - https://www.google.com/url?
q=https://www.bleepingcomputer.com/forums/t/634754/locked-in-ransomware-help-support-restore-corupted-fileshtml/&sa=D&ust=1505219068689000&usg=AFQjCNF9ioLcjI8uj-Oh5swSsBA9DBqXMw


6) Screenshot -


7) indicators of Compromise - NA


8) File Details -
MD5 b6ffac29f16e859b7aa8ab7f62b0bcef
SHA1 2eb0644345f4fbde656f316c7d9ce6866ec4335e
SHA256 8cc8125ce0cace7e1f090015a7a2e55aa0bbd06318a3f29c0a11cb6c85ad2264
ssdeep768: L / 1L41c / gaxme9hpfILteybyD1D9Hnfl9AtSy: L9LQOALMybyDJ9N9Aoy
authentihash  e4ca172031e3b85a97b9ca031b97ec94c9d32d9e7cdb33a6349462c01130ead4
imphash  f34d5f2d4577ed6d9ceec516c1f5a744
The size of the file is 38.0 KB (38912 bytes)
Win32 EXE file type
DescriptionPE32 executable for MS Windows (GUI) Intel 80386 Mono / .Net assembly

CryLocker Ransomware - IOC

1) Ransomware Name - CryLocker

2) Encrypted Extensions - .cry

3) Ransom Note File -
!Recovery_[random_chars].html
!Recovery_[random_chars].txt

4) Encrypted Algprithm - NA

5) Decryptor Link - NA

6) Screenshots -


7) Indicators of Compromise -
хттп://imgur.com
хттпs://pastee.org/
хттпs://maps.googleapis.com
UDP Traffic to ip addresses in the 37.x.x.x range
***mbfce24rgn65bx3g.rzunt3u2.com (66.23.246.239:80 - США)
***fortycooola.top (54.165.109.229:80 - США)
***smoeroota.top
***newfoodas.top
***84.200.34.99 (Германия)
***7gie6ffnkrjykggd.rzunt3u2.com
***7gie6ffnkrjykggd.er29sl.in
***7gie6ffnkrjykggd.onion



8) File Details -
the MD5 feb7967965c46e655c247054a0f500f1
the SHA1 ccdaa1dcbc450db0b9bdcbc22538137856fcc0b8
the SHA256 a37108a8960fcee98058261486a15ab2d8680844513ba60f266185b9d3d7d981
ssdeep192: 3zsQmb9geQ9ilbqibqHpjAjgIkotjv9d909 / Sc: wr5luppmz1jaac
File size 11.0 KB (11232 bytes)
File Type Text
DescriptionASCII text, with very long lines

Hermes Ransomware - IOC - File Details

1) Ransomware Name - Hermes

2) Encrypted Extensions - NA

3) Ransom Note File -
DECRYPT_INFO.txt
DECRYPT_INFORMATION.html
UNIQUE_ID_DO_NOT_REMOVE - файл с ID
hermes.exe
Reload.exe
system_.bat
shade.bat
shade.vbs

4) Encrypted Algorithm - AES

5) Decryptor Link - https://www.google.com/url?q=https://www.bleepingcomputer.com/forums/t/642019/hermes-ransomware-help-support-decrypt-informationhtml/&sa=D&ust=1504791164932000&usg=AFQjCNFF6L6BKQM0Gy3ludx8JBJ5nDRdiA

6) Screenshot -

7) Indicators of Compromise -
primary email: BM-2cXfK4B5W9nvci7dYxUhuHYZSmJZ9zibwH@bitmessage.ch
reserve email: x2486@india.com
8) File Details -
MD5 61075faba222f97d3367866793f0907b
SHA1 cc033c3bf41550563a180444b6166515faa53c3a
SHA256 059aab1a6ac0764ff8024c8be37981d0506337909664c7b3862fc056d8c405b0
ssdeep1536: 9 + Gy5E9sg99CxI4dqFhTfLZ8Lb1WyHVviF9k6zeEkA5YaH88C5Wa / HR: D2E9R9sxfdiqLP1a9keeEkA5YA9afR
authentihash  2504f77bf5514730023a60626445ee71d8ee4e60c18ad92ea5c8f33efc5ed43d
imphash  ff847787dd14576ae2…