add RansomEXX

This commit is contained in:
Delta-Sierra 2020-12-09 16:32:02 +01:00
parent 3daaa30aed
commit d3a9cf742a

View file

@ -13960,6 +13960,46 @@
},
"uuid": "f514a46e-53ff-4f07-b75a-aed289cf221f",
"value": "Darkside"
},
{
"description": "We recently discovered a new file-encrypting Trojan built as an ELF executable and intended to encrypt data on machines controlled by Linux-based operating systems.\nAfter the initial analysis we noticed similarities in the code of the Trojan, the text of the ransom notes and the general approach to extortion, which suggested that we had in fact encountered a Linux build of the previously known ransomware family RansomEXX. This malware is notorious for attacking large organizations and was most active earlier this year.\nRansomEXX is a highly targeted Trojan. Each sample of the malware contains a hardcoded name of the victim organization. Moreover, both the encrypted file extension and the email address for contacting the extortionists make use of the victims name.",
"meta": {
"extensions": [
"<company_name>",
".<abbreviated_company_name>",
".<org_name>",
".txd0t",
".dbe",
".0s"
],
"ransomnotes": [
"Greetings, Texas Department of Transportation!\nRead this message CAREFULLY and contact someone from IT department..\nYour files are securely ENCRYPTED.\nNo third party decryption software EXISTS.\nMODIFICATION or RENAMING encrypted files may cause decryption failure.\nYou can send us an encrypted file (not greater than 400KB) and we will decrypt it FOR FREE, so you have no doubts in possibility to restore all Files\nFrom all aFFected systems ANY TIME.\nEncrypted File SHOULD NOT contain sensitive inFormation (technical, backups, databases, large documents).\nThe rest oF data will be available aFter the PAYMENT.\ninfrastructure rebuild will cost you MUCH more.\nContact us ONLY if you officially represent the whole affected network.\nThe ONLY attachments we accept are non archived encrypted files For test decryption.\nSpeak ENGLISH when contacting us.\nMail us: ***@protonmail.com\nWe kindly ask you not to use GMAIL, YAHOO or LIVE to contact us.\nThe PRICE depends on how quickly you do it. "
],
"ransomnotes-filenames": [
"TXDOT_READ_ME! .Txt",
"<abbreviated_company_name> _READ_ME! .txt"
],
"ransomnotes-refs": [
"https://1.bp.blogspot.com/-hbdqo4g6OaE/XvpFV4qbjrI/AAAAAAAAT1I/RtASzBEd_VEZIhDCCCdaxrN0iGCnnocFwCLcBGAsYHQ/s1600/note-original.png",
"https://1.bp.blogspot.com/-A0tAbQoei_Y/X1UxQkema_I/AAAAAAAAVV8/QuJY6v3n6943ZFax3ztDt9FXwkpAKMPPACLcBGAsYHQ/s1600/note2-9-20.png",
"https://1.bp.blogspot.com/-RIwIgb6n0n4/X8-l2HIf88I/AAAAAAAAXRI/oyET6d1XSnwJXDIaJlwItyTFLcp4tz5mQCLcBGAsYHQ/s882/note-8-12-20.png"
],
"refs": [
"https://malpedia.caad.fkie.fraunhofer.de/details/win.ransomexx",
"https://id-ransomware.blogspot.com/2020/06/ransomexx-ransomware.html",
"https://github.com/Bleeping/Ransom.exx",
"https://www.bleepingcomputer.com/news/security/new-ransom-x-ransomware-used-in-texas-txdot-cyberattack/",
"https://www.bleepingcomputer.com/news/security/brazils-court-system-under-massive-ransomexx-ransomware-attack/",
"https://unit42.paloaltonetworks.com/vatet-pyxie-defray777/4/",
"https://securelist.com/ransomexx-trojan-attacks-linux-systems/99279/"
],
"synonyms": [
"Ransom X",
"Defray777"
]
},
"uuid": "dff71334-c173-45b6-8647-af66be0605d7",
"value": "RansomEXX"
}
],
"version": 89