Skip to main content

Kirk Ransomware - IOC - File Details


1) Ransomware Name - Kirk

2) Encrypted Extensions - .Kirked

3) Ransom Note File - RANSOM_NOTE.txt

4) Encrypted Algorithm - AES+RSA

5) Decryptor Link - https://www.google.com/url?
q=https://www.virustotal.com/en/file/39a2201a88f10d81b220c973737f0becedab2e73426ab9923880fb0fb990c5cc/analysis/&sa=D&ust=1505123329467000&usg=AFQjCNGByKzKvqvrc_XriYgEYyclhFRmYg


6) Screenshot -


7) Indicators of Compromise -
Active email addresses:
kirk.help@scryptmail.com
kirk.payments@scryptmail.com


8) File Details -
MD5 78117f7acc8b385e9b29fe711436d16d
SHA1 0d4dfe880f8ec4b394f49f1a2608200dd06ba8a6
SHA256 39a2201a88f10d81b220c973737f0becedab2e73426ab9923880fb0fb990c5cc
ssdeep98304: / IEyVyGHAeBysDq7g5SspYPchCPgkMOu4 + vQqzKdJcqXlduupA5gEbvU0Ods + 0kb: QXl / qSSspHI7vu4 + vicqy5Jv6dsuV
authentihash  7cf8bc9292554296bfc8e93b1a6c76edbfdca384b67c4e58714b159378250fc6
imphash  05a03ed18d2e75f8c4f1c5bcf287ac56
The file size is 5.5 MB (5756255 bytes)
Win32 EXE file type
DescriptionPE32 executable for MS Windows (GUI) Intel 80386 32-bit

Comments

Popular posts from this blog

Locked-In Ransomware - IOC - File Details

1) Ransomware Name - Locked-In

2) Encrypted Extensions - .novalid

3) Ransom note File -
RESTORE_CORUPTED_FILES.HTML
RESTORE_NOVALID_FILES.HTML

4) Encrypted Algorithm - AES-256

5) Decryptor Link - https://www.google.com/url?
q=https://www.bleepingcomputer.com/forums/t/634754/locked-in-ransomware-help-support-restore-corupted-fileshtml/&sa=D&ust=1505219068689000&usg=AFQjCNF9ioLcjI8uj-Oh5swSsBA9DBqXMw


6) Screenshot -


7) indicators of Compromise - NA


8) File Details -
MD5 b6ffac29f16e859b7aa8ab7f62b0bcef
SHA1 2eb0644345f4fbde656f316c7d9ce6866ec4335e
SHA256 8cc8125ce0cace7e1f090015a7a2e55aa0bbd06318a3f29c0a11cb6c85ad2264
ssdeep768: L / 1L41c / gaxme9hpfILteybyD1D9Hnfl9AtSy: L9LQOALMybyDJ9N9Aoy
authentihash  e4ca172031e3b85a97b9ca031b97ec94c9d32d9e7cdb33a6349462c01130ead4
imphash  f34d5f2d4577ed6d9ceec516c1f5a744
The size of the file is 38.0 KB (38912 bytes)
Win32 EXE file type
DescriptionPE32 executable for MS Windows (GUI) Intel 80386 Mono / .Net assembly

CryLocker Ransomware - IOC

1) Ransomware Name - CryLocker

2) Encrypted Extensions - .cry

3) Ransom Note File -
!Recovery_[random_chars].html
!Recovery_[random_chars].txt

4) Encrypted Algprithm - NA

5) Decryptor Link - NA

6) Screenshots -


7) Indicators of Compromise -
хттп://imgur.com
хттпs://pastee.org/
хттпs://maps.googleapis.com
UDP Traffic to ip addresses in the 37.x.x.x range
***mbfce24rgn65bx3g.rzunt3u2.com (66.23.246.239:80 - США)
***fortycooola.top (54.165.109.229:80 - США)
***smoeroota.top
***newfoodas.top
***84.200.34.99 (Германия)
***7gie6ffnkrjykggd.rzunt3u2.com
***7gie6ffnkrjykggd.er29sl.in
***7gie6ffnkrjykggd.onion



8) File Details -
the MD5 feb7967965c46e655c247054a0f500f1
the SHA1 ccdaa1dcbc450db0b9bdcbc22538137856fcc0b8
the SHA256 a37108a8960fcee98058261486a15ab2d8680844513ba60f266185b9d3d7d981
ssdeep192: 3zsQmb9geQ9ilbqibqHpjAjgIkotjv9d909 / Sc: wr5luppmz1jaac
File size 11.0 KB (11232 bytes)
File Type Text
DescriptionASCII text, with very long lines

Hermes Ransomware - IOC - File Details

1) Ransomware Name - Hermes

2) Encrypted Extensions - NA

3) Ransom Note File -
DECRYPT_INFO.txt
DECRYPT_INFORMATION.html
UNIQUE_ID_DO_NOT_REMOVE - файл с ID
hermes.exe
Reload.exe
system_.bat
shade.bat
shade.vbs

4) Encrypted Algorithm - AES

5) Decryptor Link - https://www.google.com/url?q=https://www.bleepingcomputer.com/forums/t/642019/hermes-ransomware-help-support-decrypt-informationhtml/&sa=D&ust=1504791164932000&usg=AFQjCNFF6L6BKQM0Gy3ludx8JBJ5nDRdiA

6) Screenshot -

7) Indicators of Compromise -
primary email: BM-2cXfK4B5W9nvci7dYxUhuHYZSmJZ9zibwH@bitmessage.ch
reserve email: x2486@india.com
8) File Details -
MD5 61075faba222f97d3367866793f0907b
SHA1 cc033c3bf41550563a180444b6166515faa53c3a
SHA256 059aab1a6ac0764ff8024c8be37981d0506337909664c7b3862fc056d8c405b0
ssdeep1536: 9 + Gy5E9sg99CxI4dqFhTfLZ8Lb1WyHVviF9k6zeEkA5YaH88C5Wa / HR: D2E9R9sxfdiqLP1a9keeEkA5YA9afR
authentihash  2504f77bf5514730023a60626445ee71d8ee4e60c18ad92ea5c8f33efc5ed43d
imphash  ff847787dd14576ae2…