Source |
Contagio |
Identifiant |
8569212 |
Date de publication |
2024-09-03 13:33:53 (vue: 2024-09-03 18:17:59) |
Titre |
2024-09-02 ABYSS Ransomware Windows et Linux Samples 2024-09-02 ABYSS Ransomware Windows and Linux Samples |
Texte |
|
Notes |
★★
|
Envoyé |
Oui |
Condensat |
└── ├── 0079fb42859d04096cf9d6aaaaf6a463bd723b1fb7625d4137cc88b890dbec51 00fb27c489126cb61a2908f0ce15961c4af4681985e233cdac4f021fb3735ad0 03f9dccb15e19b5af71d1c831f963e834c41a42777b270bd1d60230f88fe6a95 056220ff4204783d8cc8e596b3fc463a2e6b130db08ec923f17c9a78aa2032da 07532f7b226afb8e4a931d9e51da41a6c163c4b59b7472682999ce795fd48ca1 0763e887924f6c7afad58e7675ecfe34ab615f4bd8f569759b1c33f0b6d08c64 0d2c958ee0a7a8667b93d0f9aaa265a32fbd44f3af0aaca9dfe93bfd0253d035 10eddba5af7b55a8bd815fd98184cb703583bee61812fcf3e12f8b220bf3a7c7 112a76c7fb220e0e44f96d833da260cfadb051e64a9311e19f34448eb856341f 1189c8aa073b9630958a1d8fdb81b8a1f6b538962e7b39c1de9071ab25007a23 13158c90fe1a73a8bfec9205dbfe65a5346632a637d92d8aa671737af804e61d 1a31b8e23ccc7933c442d88523210c89cebd2c199d9ebb88b3d16eacbefe4120 1d04d9a8eeed0e1371afed06dcc7300c7b8ca341fe2d4d777191a26dabac3596 2023 2024 25ce2fec4cd164a93dee5d00ab547ebe47a4b713cced567ab9aca4a7080afcb7 2cc6aeea99c5c45d16a4d84bf9c87c1fac3c3a390214179331d7049457ee7621 2e42b9ded573e97c095e45dad0bdd2a2d6a0a99e4f7242695054217e2bba6829 362a16c5e86f13700bdf2d58f6c0ab26e289b6a5c10ad2769f3412ec0b2da711 3b2687884f2cc8710fabcfa39264a6fa2056d5178b1a9aba027a74abdf273ed6 3fd080ef4cc5fbf8bf0e8736af00af973d5e41c105b4cd69522a0a3c34c96b6d 505934035dfcff6afabc9c29c10e1aa30187207f7c805ea10d24621d09db9277 62069d85d187ffc78dc0c8b108098016b7631b5cc7501e30be3d1515eddd781a 68cbeaccb231459ceb604934f9b4cb6fc3b51901293db9d8464074e350f11bc2 6f9046f4bc6517d47150caa3d6ddbc327cced5eecd86e8699d105beef388c3c0 72310e31280b7e90ebc9a32cb33674060a3587663c0334daef76c2ae2cc2a462 822c77cc025d12b267cf598a3bdff207b1ba278e96126590ac60d88701cd840a 877c8a1c391e21727b2cdb2f87c7b0b37fb7be1d8dd2d941f5c20b30eb65ee97 88f16d251a88b9429ca9a99d4fb3083081ff55fb7cedfb32213b4bca011e9ce7 9243bdcbe30fbd430a841a623e9e1bcc894e4fdc136d46e702a94dad4b10dfdc 94fa7d8eefce262cb2386b8fff2e1f35c8f35d570cecef54515207b9df40d97d abyss access across active advanced algorithm; alters analysis appends are avoids b524773160f3cb3bfb96e7704ef31a986a179395d40a578edce8257862cafe5f ba7c611f8c14a5651b33405a521e189ad17210b36633972700540ba2056564a0 based boot both c++ characteristics:target configuration configurations critical crypt d58c756206dcf233d853ddf3c7c7cfd7b2052637211f442b10b93995e969f0d7 daemon dark data dced334f3d9739ef157ead80133d584af782e22e87d227a5ed83bf968f17d367 dee2af08e1f5bb89e7bad79fae5c39c71ff089083d65da1c03c7a4c051fabae0 demands detection directories directory disable disables disrupt down downloaddownload dropped e331eac881cbd0c473dfc63de47e9cead852625658ab7e602f9ed5128b65c6a4 e5417c7a24aa6f952170e9dfcfdf044c2a7259a03a7683c3ddb72512ad0cd5c7 e63420bc4a633d9e44e146ceeee17584e752b3e6fd9700137373746461d7b378 e6537d30d66727c5a306dc291f02ceb9d2b48bffe89dd5eff7aa2d22e28b6d7c each elf email emails employs encryption encryption: encrypts ensure environments establishes esxcli esxi evade exchange exe exfiltrates exploiting exposed exposure extensions extortion f88f90760aa5f3bfa3977b5f388db814b767878dc6b9d45929c1ee94d7f5c57d file files finance firstidentified focus forensic functionality healthcare hinder including infiltration information├── initial key known leak leverages linux linux│ machines maintain manage met mssql multi need network not note obfuscation: operations options partial particularly password persistence: phishing platforms: post processes profile: public ransom ransomware ransomwareabyss reboot recovery remains salsa20 salsa20; samples scheme sectors selective servers services shut site socradar: sophisticated specific ssh strain strategic success system systems tactics tactics: targeting targeting: techniques technology termination: threatening tor txt using utilizes variant:service variant:vmware various vectors: virtual vmware vulnerabilities weak web whathappened windows windows writte |
Tags |
Ransomware
Vulnerability
Medical
|
Stories |
|
Move |
|