Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Generic User Avatar

RansomHub Ransomware (random 6 chars; README_[random 6.txt]) Support Topic


  • Please log in to reply
7 replies to this topic

#1 ITman1240

ITman1240

  •  Avatar image
  • Members
  • 3 posts
  • ONLINE
  •  

Posted 02 March 2024 - 09:27 AM

Any files that are encrypted with RansomHub Ransomware will have a random 6 character (CAP LTRS/Numbers) extension appended to the end of the encrypted data filename and typically will leave files (ransom notes) which include the same README_[random 6 char].txt as part of its name. These are some examples.

.D6CDC8
README_d6cdc8.txt

Ransomhub Description
RansomHub (Active)

Crypto-Ransomware
Data Broker
RaaS
TOR http://ransomxifxwc5eteopdobynonjctkxxvap77yqifu2emfbecgbqdw6qd.onion

 
 
 
I got a ransomware and all my files are encrypted with filename.(old_extension).D6CDC8. Has anyone seen this ransomware variant or can Identify it?
 
The ransomware note looks similar to lockbit:
 
Hello!
 
Visit our Blog: 
    Tor Browser Links:
        http://ransomxifxwc5eteopdobynonjctkxxvap77yqifu2emfbecgbqdw6qd.onion/
    Links for normal browser:
        http://ransomxifxwc5eteopdobynonjctkxxvap77yqifu2emfbecgbqdw6qd.onion.ly/
 
 
>>> Your data is stolen and encrypted.
 
If you don't pay the ransom, the data will be published on our TOR darknet sites. Keep in mind that once your data appears on our leak site, it could be bought by your competitors at any second, so don't hesitate for a long time. The sooner you pay the ransom, the sooner your company will be safe.



BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,818 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:12:07 AM

Posted 02 March 2024 - 09:37 AM

It is not uncommon for criminals to steal all or parts of ransom note contents from other criminals.
 

What is the actual name of the ransom note? 
 
Please attach the original (unedited) ransom note and several samples of encrypted files (different formats - doc, png, jpg) AND its original (unencrypted) file in a "zip file" for comparison so our crypto malware experts can manually inspect them and possibly identify/confirm the infection if they see this topic. To attach files....Click the More Reply Options button in the bottom right corner of the Board Editor, then click the Choose File button under Attach Files.
 
Did you submit (upload) samples of encrypted files, ransom notes and any contact email addresses provided by the cyber-criminals to ID Ransomware (IDR) for assistance with identification and confirmation of the infection? ID Ransomware can identify ransomware which adds a prefix instead of an extension and more accurately identifies ransomware by filemarkers if applicable. Uploading both encrypted files and ransom notes together along with any email addresses provided gives a more positive match with identification and helps to avoid false detections. Please provide a link to the ID Ransomware results.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#3 ITman1240

ITman1240
  • Topic Starter

  •  Avatar image
  • Members
  • 3 posts
  • ONLINE
  •  

Posted 02 March 2024 - 09:53 AM

The ransom note is called README_d6cdc8.txt I have attached some encrypted files but I will have to get more samples from the device today when I get back home. 

The ID ransomware reference is SHA1: cc36f0e377d29d0d4d26eefe708657eafb17148e

 

Attached Files


Edited by ITman1240, 02 March 2024 - 09:55 AM.


#4 rivitna

rivitna

  •  Avatar image
  • Security Colleague
  • 185 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:08:07 AM

Posted 02 March 2024 - 11:40 AM

This is new ransom gang RansomHub.



#5 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,818 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:12:07 AM

Posted 02 March 2024 - 12:17 PM

Unveiling RansomHub

Ransomhub Description
RansomHub (Active)

Crypto-Ransomware
Data Broker
RaaS
TOR http://ransomxifxwc5eteopdobynonjctkxxvap77yqifu2emfbecgbqdw6qd.onion

.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#6 ITman1240

ITman1240
  • Topic Starter

  •  Avatar image
  • Members
  • 3 posts
  • ONLINE
  •  

Posted 02 March 2024 - 02:37 PM

Its definitely going to be impossible to decrypt these files due to the lack of information surrounding this new group and their ransomware variant. Thanks again guys for at least pointing me in the right direction. Ill continue to follow the news about this group. Do they post the data immediately to their blog for companies and what would be a good indication of them leaking a small companies information?



#7 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,818 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:12:07 AM

Posted 02 March 2024 - 03:03 PM

If we receive any updates or anything new to report, that information will be posted here.

 

When or if a free (or legitimate paid for) decryption solution is found, that information will be provided in this topic and victims will receive notification if subscribed to it. In addition, a news article most likely will be posted on the Bleeping Computer front page.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#8 ransomhub_affiliate

ransomhub_affiliate

  •  Avatar image
  • Banned Spammer
  • Member rank image
  • 1 posts
  • OFFLINE
  •  
  • Local time:05:07 AM

Posted 04 March 2024 - 03:33 PM

i am the affiliate that has ransomwared you, just pay it bro i've been waiting for too long.

instead of contacting us with your link you decide to ask for help on bleepingcomputer?? they should fire you lol






2 user(s) are reading this topic

0 members, 2 guests, 0 anonymous users