Screenshot der Akira-Leakseite (Tor Hidden Service)
.MmXReVIxLV
(variabel generierte Endung) – Erweiterung verschlüsselter Dateien[RANDOM]-RECOVER-README.txt
– Erpressernachricht mit KontaktinformationenSHA‑256:
b3c8fefee9394b89f57fcfc0a7ae07133a8f7cbb2f8efcdd8b91a3b8cfaa0ba0
579efbffb8e364181d127e53d7223cfe7efc34ff27f13a130c78226a8d3d6715
vssadmin delete shadows /all /quiet
bcdedit /set {current} safeboot minimal
wmic shadowcopy delete
netsh advfirewall set allprofiles state off
PsExec
AnyDesk
ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion
T1078
- Valid Accounts (z. B. VPN ohne MFA), T1133
- External Remote ServicesT1059
- Command and Scripting Interpreter (PowerShell)T1547
- Boot or Logon Autostart ExecutionT1068
- Exploitation for Privilege EscalationT1562
- Impair Defenses (AV-Killer, Shadow Copy löschen)T1003
- OS Credential Dumping (Mimikatz, LaZagne)T1087
- Account Discovery, T1018
- Remote System DiscoveryT1021
- Remote Services (RDP, SMB)T1119
- Automated CollectionT1041
- Exfiltration Over C2 Channel (z. B. Rclone, FileZilla)T1486
- Data Encrypted for Impact, T1490
- Inhibit System Recovery
-- Qilin
Your network/system was encrypted.
Encrypted files have new extension.
-- Compromising and sensitive data
We have downloaded compromising and sensitive data from you system/network
If you refuse to communicate with us and we do not come to an agreement, your data will be published.
Data includes:
- Employees personal data, CVs, DL , SSN.
- Complete network map including credentials for local and remote services.
- Financial information including clients data, bills, budgets, annual reports, bank statements.
- Complete datagrams/schemas/drawings for manufacturing in solidworks format
- And more...
-- Warning
1) If you modify files - our decrypt software won't able to recover data
2) If you use third party software - you can damage/modify files (see item 1)
3) You need cipher key / our decrypt software to restore you files.
4) The police or authorities will not be able to help you get the cipher key. We encourage you to consider your decisions.
-- Recovery
1) Download tor browser: https://www.torproject.org/download/
2) Go to domain
3) Enter credentials-- Credentials
Extension: [snip]
Domain: e3v6tjarcltwc4hdkn6fxnpkzq42ul7swf5cfqw6jzvic4577vxsxhid.onion
login: [snip]
password:[snip]
-- Qilin
We have 3.4TB of your data stored on our servers. Contact us or we will publish this data on our blog, in the media and pass it on to the relevant authorities. We are ready to offer you a discount in case of payment within a week.
Your network/system was encrypted.
Encrypted files have new extension.
-- Compromising and sensitive data
We have downloaded compromising and sensitive data from your system/network.
Our group cooperates with the mass media.
If you refuse to communicate with us and we do not come to an agreement, your data will be reviewed and published on our blog and on the media page (https://wikileaks2.site/)
Blog links:
http://kbsqoivihgdmwczmxkbovk7ss2dcynitwhhfu5yw725dboqo5kthfaad.onion
http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion
Data includes:
- Employees personal data, CVs, DL , SSN.
- Complete network map including credentials for local and remote services.
- Financial information including clients data, bills, budgets, annual reports, bank statements.
- Complete datagrams/schemas/drawings for manufacturing in solidworks format
- And more...
-- Warning
1) If you modify files - our decrypt software won't able to recover data
2) If you use third party software - you can damage/modify files (see item 1)
3) You need cipher key / our decrypt software to restore you files.
4) The police or authorities will not be able to help you get the cipher key. We encourage you to consider your decisions.
-- Recovery
1) Download tor browser: https://www.torproject.org/download/
2) Go to domain
3) Enter credentials
Please note that communication with us is only possible via the website in the Tor browser, which is specified in this note.
All other means of communication are not real and may be created by third parties, if such were not provided in this note or on the website specified in this note.
-- Credentials
Extension: 2ir53sQQAU
Domain: [snip]
login: [snip]
password:[snip]
-- Agenda
Your network/system was encrypted.
Encrypted files have new extension.
-- Compromising and sensitive data
We have downloaded compromising and sensitive data from you system/network
If you refuse to communicate with us and we do not come to an agreementyour data will be published.
Data includes:
- Employees personal dataCVsDLSSN.
- Complete network map including credentials for local and remote services.
- Financial information including clients databillsbudgetsannual reportsbank statements.
- Complete datagrams/schemas/drawings for manufacturing in solidworks format
- And more...
-- Warning
1) If you modify files - our decrypt software won't able to recover data
2) If you use third party software - you can damage/modify files (see item 1)
3) You need cipher key / our decrypt software to restore you files.
4) The police or authorities will not be able to help you get the cipher key. We encourage you to consider your decisions.
-- Recovery
1) Download tor browser: https://www.torproject.org/download/
2) Go to domain
3) Enter credentials
-- Credentials
Extension: DtMXQFOCos
Domain: wlh3dpptx2gt7nsxcor37a3kiyaiy6qwhdv7o6nl6iuniu5ycze5ydid.onion
login: [snip]
password: [snip]
Dateiendung(en): *.MmXReVIxLV (variabel pro Angriff)
Ransom Note: *-RECOVER-README.txt
Leak Site (Tor): ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion
Verdächtige Prozesse: psexesvc.exe, esxcli, esxcfg-info
Remote Tools: PsExec, AnyDesk, RDP
Command-Line IOCs:
- vssadmin delete shadows /all /quiet
- bcdedit /set {current} safeboot minimal
- wmic shadowcopy delete
- netsh advfirewall set allprofiles state off
Hash-Beispiel (SHA256):
- b3c8fefee9394b89f57fcfc0a7ae07133a8f7cbb2f8efcdd8b91a3b8cfaa0ba0
- 579efbffb8e364181d127e53d7223cfe7efc34ff27f13a130c78226a8d3d6715