General

  • Target

    ef6a96bf68ec54d78f4f4cd304acc6718f9dfe398f368bc1e5b127bd746302f2

  • Size

    166KB

  • Sample

    200413-j81zhvwmsn

  • MD5

    c92b042810b6ebc8c31dec42d898aad5

  • SHA1

    1ed1e16a78c0760d318b6bf69410f3b35126eb75

  • SHA256

    ef6a96bf68ec54d78f4f4cd304acc6718f9dfe398f368bc1e5b127bd746302f2

  • SHA512

    5b662a76302dd4379619a01b6d45f75b045950245c326a243ab18f8923f823b0607352c1d4162d949779fa1eb6b08e513e15289a7529ae457af4a9752487d7b4

Malware Config

Extracted

Family

sodinokibi

C2

eco-southafrica.com

skiltogprint.no

knowledgemuseumbd.com

liikelataamo.fi

ccpbroadband.com

kissit.ca

devstyle.org

trackyourconstruction.com

mikeramirezcpa.com

ledmes.ru

oneheartwarriors.at

div-vertriebsforschung.de

y-archive.com

darnallwellbeing.org.uk

erstatningsadvokaterne.dk

compliancesolutionsstrategies.com

selfoutlet.com

deoudedorpskernnoordwijk.nl

zflas.com

creamery201.com

Attributes
  • net

    false

  • pid

    $2a$10$zusQj9hjiIpsOi2N2LsnqudQftEJoZk6Q8wIIf8rawQ4MmoOW6oHa

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-read-me.txt and follow instuctions

  • ransom_template

    ---=== Welcome Fire Quest Fire Alarm Service. ===--- [+] Whats Happen? [+] Your network has been penetrated. Your files are encrypted with strong military algorithm, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). Also, all your business info copyed to our servers. Personal data of your clients and business contacts extracted. If you do not take action to contact us, the data will be published fo free access everyone or will be send your competitor. As soon as we receive the payment, all data will be deleted from our servers. [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Contact with us in chat on website. You have 3 days. If you need more time to make a decision and collect money for payment - inform the support chat about this. [+] How will the decryption process proceed after payment? [+] After payment we will send to you our scanner-decoder program and detailed instructions for use. With this program you will be able to decrypt all your encrypted files. Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    3845

Extracted

Path

C:\6ily0q-read-me.txt

Family

sodinokibi

Ransom Note
---=== Welcome Fire Quest Fire Alarm Service. ===--- [+] Whats Happen? [+] Your network has been penetrated. Your files are encrypted with strong military algorithm, and currently unavailable. You can check it: all files on your system has extension 6ily0q. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). Also, all your business info copyed to our servers. Personal data of your clients and business contacts extracted. If you do not take action to contact us, the data will be published fo free access everyone or will be send your competitor. As soon as we receive the payment, all data will be deleted from our servers. [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F2356FE4A97D19E6 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/F2356FE4A97D19E6 Contact with us in chat on website. You have 3 days. If you need more time to make a decision and collect money for payment - inform the support chat about this. [+] How will the decryption process proceed after payment? [+] After payment we will send to you our scanner-decoder program and detailed instructions for use. With this program you will be able to decrypt all your encrypted files. Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: 2MFA2ehiJgAeybBN5OC7KEmAu36He4AiGLsdR7XVvae1T/VZsBJog/UJWNdD6Ksi WQMcpiY0fFiNB4I/lq6M1MjsnZWjwpkQOkgoOXVMhJmmUhxuXqNBMdRmcgihhW+4 FJOf36HZmgR8R6L4zTDW3hA3/O3rxTGvhrjWTOT/A/edulqciJw8W+gOtf8OHzZp XPMY2wlothQCqE8pRQPy4N44gunb0M0Czt0K5AnDGQAxYh9AyRyDtMIf9THfsQGa F+L39SDpnBdUJGfDvOD4G72V4pDqsFCKfu9i/eqrXKWdZ0d7ebLOKDlRYGxZCop2 sKeJsCL0QxlpIEriNjGQben5BNCh2CUVCL/3LicoKSBEDK2wobjPtHI3TwwU3u91 NofO6PG1R5U+Y3XfwQrBt61uugrCEsQ45LBn/exb24MwVsgcSaNQZWS8fK5ZqHyj HwxRclTZGIoOdWuWvBsklNUvA6wfauDUn19eZOTMUG9l5fUJ2bmwe4USkDktnCmd 6qb9bMj1bauejJcaNFL5IZtc0ONmVvnefPEet+az1OFFMvA49pOH/tX90D1HJVSX AqvupWf3W3pZgBxnHEAPBYyQp4155DX55FwbwvGT9c8oZf2/x3Cc+CshBNbtnkbk +PeLpNCj3ghXfYQ5zU+e49SGRosvIZKpRscFnG5rV6XXSGAoGGZhxV45ktS+pa2z DvR/GgF+oADHOri0NNmo0kZDjeYMFpyG6yv+58rKSYJ2yb3bMf1a52LDdbFLplyI cvdrFbz4lcGRk0bhpeii5N1nODNEtwnPxySIkvtCn3Kmbb6171x13gRlSBSTNC8A HzmlbZjY56KNrJwDl4pALWU9GhtpjDbsMYNXRIrBDHlE2qL0LTz+rKAt6R1p1bLD DNfVOY4ezQaZhHC81Yub8/kpbw8MTFLIb5PG8Utp0y/SumZLh+S0mcl36Bq/k7Qc 26bKccJp4x98VdM/OmYXP/y7AkQUPI6iYN3vLjzjanDrGNzl+e3JMjoLL3wX7TUU c7TNoE7RvIxbAynF7fedVS7NmuB+Sn0N3rbDb+QzzhyqvCIOoVGab7AXWk6NeLxb YCitgiK3xdTTS0HJtzV5NEVDVGDxwLrBpyVoyy3hmd1fXqIEIOyTrVgIDIpOUQyM i0sPpCmbO0/Fm74l1psDxy9FvITErs++WDPwU8J2zVBRe8QOY3FU9NqsKvJoS1eN KznD2zRxKWTt/eGDBnYlfOc8+sVEpxpAW8NT1glMI9OOpSIdUOQu37CXvv4iXjgC IKkDbp+bAnoKwcUiGkE/a9E68yE5db/j7krf5cl1W0Q= ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F2356FE4A97D19E6

http://decryptor.cc/F2356FE4A97D19E6

Extracted

Path

C:\e09jsh9j-read-me.txt

Family

sodinokibi

Ransom Note
---=== Welcome Fire Quest Fire Alarm Service. ===--- [+] Whats Happen? [+] Your network has been penetrated. Your files are encrypted with strong military algorithm, and currently unavailable. You can check it: all files on your system has extension e09jsh9j. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). Also, all your business info copyed to our servers. Personal data of your clients and business contacts extracted. If you do not take action to contact us, the data will be published fo free access everyone or will be send your competitor. As soon as we receive the payment, all data will be deleted from our servers. [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/AAB2B236350A3ABB 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/AAB2B236350A3ABB Contact with us in chat on website. You have 3 days. If you need more time to make a decision and collect money for payment - inform the support chat about this. [+] How will the decryption process proceed after payment? [+] After payment we will send to you our scanner-decoder program and detailed instructions for use. With this program you will be able to decrypt all your encrypted files. Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: kpEW17fQe8lgDfrFTyehZ+cI6sXwylk2FzkR8CWMjD0w3Nvs8ZPkcRE2ITAmJDT/ 7q3XzdySP4zDKHobOaE5obsYI0r4bWn2STFfj9oMmWg1xeZH/HP7tYZERBpt0yQp e6AjaEn/tpuZmrkx5ltVUVcBPucCQITjrWUNwDJVNl6A4B2Fdl9Nvqk7uCT1Z/Qi kVxK6KWpYrqW4i4Vy4CHjIoVNBEFwdBKaMg29Gw/t76rdgbgaUTUB+tuiwlxL0K2 Vh2xUE6uGPXC4R1TpVJ7qzHgqsJwpQwd+1FM5LUxXv0w4QU+W5lpEhBmfC3YjOv7 0hNssftn21jkzZoJ5L8SZXtVNK2B4LsqxzgSMHe44U0nRRFWjW4m5VizmSRCTUO7 riFpQUhqju0/+q++ILvUUSLXqs6OzsuN6hmNmzN9oko7Xc0osZ9xLtjtTdzWXomX AIOajtE42eI1d0ELy5dMpYF9CFCzjw8c4i9N8uq6JxlWUTzhzTJmDsPe/YzUpnaf OSd+mjxOcs1qwHVFtRuP2BcamHjd7pxURqx/OZKiDh6KWA4Bm6bzJYUtjGU1sV5n LgFZ9eXNOM2WYxk6n+jeCD+3Ruev6WxeMed3pIM2sGuz2sIvPA+4MXxlNcvVrAIW tEeOyfnzcxPB5TeWwxY0wPMnlcCkp5bAstp45vI/SAK1I1v/5rrnNR3n3oYAwDam TIDegvSQS1w7Xal5kCsosZJeqPFTlo/KQCmcV861tbyfDJkjvorLbAzWJW30fVxr ganqx1MNBALIifdlzZvw3wuvrPBuAfdhvwVircE2BEafNojZwsXVIeVm3l2i5cu/ ZNiD1CHER8MjITmc09aCIfnNPvYMgWRH66iVkZWcva58Vg4PQpaMuoq7Y19DVCA5 zd0pe/NS9RPSRLMFppubdJwfO13wLeYPWM/WYHy/ZiJcp9FRgJzdPLmwa1bbLYUi SxpCsmzgxMY2RIAUAVgkUWq5R1CWVE6lWZY2PuknnVBjapcbSOARyldzGKx0tARM p/tS+u2W3V4cGMJSv3KH+cjtFBUhWGXz5GQD5Tn3+RAKKbV52Y+OryRbXi1xhuoK BFfU3hPLD1mz8ej4vOlBqNiVP+VBgBDe8syyoA47YEHS7vYeDQKvDGl+7Iv7umO6 sDoCWz59S3OrrEZhy/Gf+tPflJgsVOjxa9M6CDuY1hDT1wgDs97QFfjS09UXpc3W KUkpGitH+f1/2iNk5g+gtrjiznjRAB5lpZBZ8Yc4Whczs0h3Lxv4O/jzga+TyNt3 8LvS2Ex90QNhYVSMfnr92oAweJY= ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/AAB2B236350A3ABB

http://decryptor.cc/AAB2B236350A3ABB

Targets

    • Target

      ef6a96bf68ec54d78f4f4cd304acc6718f9dfe398f368bc1e5b127bd746302f2

    • Size

      166KB

    • MD5

      c92b042810b6ebc8c31dec42d898aad5

    • SHA1

      1ed1e16a78c0760d318b6bf69410f3b35126eb75

    • SHA256

      ef6a96bf68ec54d78f4f4cd304acc6718f9dfe398f368bc1e5b127bd746302f2

    • SHA512

      5b662a76302dd4379619a01b6d45f75b045950245c326a243ab18f8923f823b0607352c1d4162d949779fa1eb6b08e513e15289a7529ae457af4a9752487d7b4

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Blacklisted process makes network request

    • Discovering connected drives

    • Modifies system certificate store

    • Drops file in System32 directory

    • Modifies service

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks