{ "Event": { "analysis": "2", "date": "2017-07-20", "extends_uuid": "", "info": "OSINT - The ZAYKA and NOOB CryptoMix Ransomware Variants Released in Quick Succession", "publish_timestamp": "1503930201", "published": true, "threat_level_id": "3", "timestamp": "1503930194", "uuid": "59a3c0d9-6e00-4f61-b768-47d6950d210f", "Orgc": { "name": "CIRCL", "uuid": "55f6ea5e-2c60-40e5-964f-47a8950d210f" }, "Tag": [ { "colour": "#0088cc", "name": "misp-galaxy:ransomware=\"CryptoMix\"" }, { "colour": "#004646", "name": "type:OSINT" }, { "colour": "#ffffff", "name": "tlp:white" }, { "colour": "#2c4f00", "name": "malware_classification:malware-category=\"Ransomware\"" }, { "colour": "#00223b", "name": "osint:source-type=\"blog-post\"" } ], "Attribute": [ { "category": "External analysis", "comment": "", "deleted": false, "disable_correlation": false, "timestamp": "1503930187", "to_ids": false, "type": "link", "uuid": "59a3c0eb-d44c-4133-bf6c-4233950d210f", "value": "https://www.bleepingcomputer.com/news/security/the-zayka-and-noob-cryptomix-ransomware-variants-released-in-quick-succession/", "Tag": [ { "colour": "#00223b", "name": "osint:source-type=\"blog-post\"" } ] }, { "category": "External analysis", "comment": "", "deleted": false, "disable_correlation": false, "timestamp": "1503930187", "to_ids": false, "type": "comment", "uuid": "59a3c0fa-676c-4413-acb9-495a950d210f", "value": "CryptoMix is releasing new variants very quickly now and is reminiscent of how the Locky developers used to distribute Locky. Yesterday, ID-Ransomware's Michael Gillespie & Malwarebytes malware researcher Marcelo Rivero discovered two new variants of the CryptoMix ransomware being distributed within a week or two of each other. These variants append either the NOOB or ZAYKA extension to encrypted files, but use the same contact email of admin@zayka.pro for payment instructions.", "Tag": [ { "colour": "#00223b", "name": "osint:source-type=\"blog-post\"" } ] }, { "category": "Payload delivery", "comment": "NOOB version", "deleted": false, "disable_correlation": false, "timestamp": "1503930187", "to_ids": true, "type": "sha256", "uuid": "59a3c152-41b0-4924-b651-493a950d210f", "value": "ceaee070d84bb182593787002442520acbbac7a0e5ec6cecde40370d5d744023" }, { "category": "Payload delivery", "comment": "ZAYKA version", "deleted": false, "disable_correlation": false, "timestamp": "1503930187", "to_ids": true, "type": "sha256", "uuid": "59a3c152-bd44-48cb-964f-4beb950d210f", "value": "aaf7bdb7445d7d58e597240630b23bd7f3f2c6551de61029e932eaa09e27a685" }, { "category": "Payload delivery", "comment": "", "deleted": false, "disable_correlation": false, "timestamp": "1503930187", "to_ids": true, "type": "filename", "uuid": "59a3c160-4c58-46a3-b48a-47a5950d210f", "value": "_HELP_INSTRUCTION.TXT" }, { "category": "Payload delivery", "comment": "", "deleted": false, "disable_correlation": false, "timestamp": "1503930187", "to_ids": true, "type": "filename", "uuid": "59a3c160-1068-438a-903f-4069950d210f", "value": "%AppData%\\[random].exe" }, { "category": "Payload delivery", "comment": "contact mail in the ransom note", "deleted": false, "disable_correlation": false, "timestamp": "1503930187", "to_ids": true, "type": "email-src", "uuid": "59a3c1ff-e884-4e50-9e49-44cb950d210f", "value": "admin@zayka.pro" }, { "category": "Payload delivery", "comment": "ZAYKA version - Xchecked via VT: aaf7bdb7445d7d58e597240630b23bd7f3f2c6551de61029e932eaa09e27a685", "deleted": false, "disable_correlation": false, "timestamp": "1503930188", "to_ids": true, "type": "sha1", "uuid": "59a4274c-b8f4-464b-b95b-459402de0b81", "value": "53371fd7a36fcf23d615143ba82045a417850c08" }, { "category": "Payload delivery", "comment": "ZAYKA version - Xchecked via VT: aaf7bdb7445d7d58e597240630b23bd7f3f2c6551de61029e932eaa09e27a685", "deleted": false, "disable_correlation": false, "timestamp": "1503930188", "to_ids": true, "type": "md5", "uuid": "59a4274c-f1e8-46ed-afa7-47f202de0b81", "value": "c34e3bcddab6b671cccb1c5e9ba3a881" }, { "category": "External analysis", "comment": "ZAYKA version - Xchecked via VT: aaf7bdb7445d7d58e597240630b23bd7f3f2c6551de61029e932eaa09e27a685", "deleted": false, "disable_correlation": false, "timestamp": "1503930188", "to_ids": false, "type": "link", "uuid": "59a4274c-a26c-4940-8ab2-4eb102de0b81", "value": "https://www.virustotal.com/file/aaf7bdb7445d7d58e597240630b23bd7f3f2c6551de61029e932eaa09e27a685/analysis/1500647663/" }, { "category": "Payload delivery", "comment": "NOOB version - Xchecked via VT: ceaee070d84bb182593787002442520acbbac7a0e5ec6cecde40370d5d744023", "deleted": false, "disable_correlation": false, "timestamp": "1503930188", "to_ids": true, "type": "sha1", "uuid": "59a4274c-9fbc-4261-86dc-44c502de0b81", "value": "f71297632052974c83b95412dcb07090089b890d" }, { "category": "Payload delivery", "comment": "NOOB version - Xchecked via VT: ceaee070d84bb182593787002442520acbbac7a0e5ec6cecde40370d5d744023", "deleted": false, "disable_correlation": false, "timestamp": "1503930188", "to_ids": true, "type": "md5", "uuid": "59a4274c-bb90-4eb0-8899-420a02de0b81", "value": "a862f5ee210a43fddcb33ad2f01af73f" }, { "category": "External analysis", "comment": "NOOB version - Xchecked via VT: ceaee070d84bb182593787002442520acbbac7a0e5ec6cecde40370d5d744023", "deleted": false, "disable_correlation": false, "timestamp": "1503930188", "to_ids": false, "type": "link", "uuid": "59a4274c-fbdc-40d5-ba87-44ae02de0b81", "value": "https://www.virustotal.com/file/ceaee070d84bb182593787002442520acbbac7a0e5ec6cecde40370d5d744023/analysis/1503697510/" } ] } }