# AtomSilo Ransomware **[chuongdong.com/reverse engineering/2021/10/13/AtomSiloRansomware/](https://chuongdong.com/reverse%20engineering/2021/10/13/AtomSiloRansomware/)** Chuong Dong October 13, 2021 [Reverse Engineering · 13 Oct 2021](http://10.10.0.46/categories/#reverse%20engineering) ## Contents Overview #### This is my analysis for AtomSilo Ransomware. AtomSilo uses the standard hybrid-cryptography scheme of RSA-512 and AES to encrypt files and protect its keys. Since it fails to utilize multithreading and uses a DFS algorithm to traverse through directories, AtomSilo’s encryption is quite slow. The malware is relatively short and simple to analyze, so it’s definitely a beginner-friendly choice for those who want to get into ransomware analysis! Figure 1: AtomSilo leak site. ## IOCS #### This sample is a 64-bit Windows executable. ----- #### MD5: 81f01a9c29bae0cfa1ab015738adc5cc SHA256: 7a5999c54f4588ff1581d03938b7dcbd874ee871254e2018b98ef911ae6c8dee Sample: https://bazaar.abuse.ch/sample/7a5999c54f4588ff1581d03938b7dcbd874ee871254e2018b9 8ef911ae6c8dee/ ## Ransom Note #### The content of the ransom note is stored in plaintext in AtomSilo’s executable. The encrypted victim’s RSA public key is appended to the end of the note before the files are dropped on the system. The ransom note filename is in the form of README-FILE-[Computer Name]-[Starting Timestamp].hta or index.html. Figure 2: AtomSilo ransom note. Below is the full content of the ransom note file dropped on my machine. ----- ```
We are AtomSilo.Sorry to inform you that your files has been obtained and encrypted by us.
But don’t worry, your files are safe, provided that you are willing to pay the ransom.
Any forced shutdown or attempts to restore your files with the thrid-party software will be damage your files permanently!
The only way to decrypt your files safely is to buy the special decryption software from us.
The price of decryption software is 1000000 dollars.
If you pay within 48 hours, you
only need to pay 500000 dollars. No price
reduction is accepted.
We only accept Bitcoin payment,you can buy it from bitpay,coinbase,binance or others.
You have five days to decide whether to pay or not. After a week, we will no longer provide decryption tools and publish your files
You can contact us with the following email:
If this email can't be contacted, you can find the latest email address on the following website:
If you don’t know how to open this dark web site, please follow the steps below to installation and use TorBrowser:
If you have any problems during installation or use of TorBrowser, please, visit hxxps://www[.]youtube[.]com and type request in the search bar "Install TorBrowser Windows" and you will find a lot of training videos about TorBrowser installation and use.
Additional information:
You will find the instructions ("README-FILE-#COMPUTER##TIME#.hta") for restoring your files in any folder with your encrypted files.
The instructions "README-FILE-#COMPUTER#-#TIME#.hta" in the folders with your encrypted files are not viruses! The instructions "README-FILE#COMPUTER#-#TIME#.hta" will help you to decrypt your files.
Remember! The worst situation already happened and now the future of your files depends on your determination and speed of your actions.