General
-
Target
qbrjGY3i.bat
-
Size
198B
-
Sample
200430-dm6y17pbpa
-
MD5
cbbd8b182519724730053b25823337b8
-
SHA1
627c36d0b7ab667bbcaced29b565bab53b874bbc
-
SHA256
860285cbcff21687d85561abf924d2339f21a00b026da8a8798f6779f7ce70f9
-
SHA512
2a3bf826ac1a0ce9365b4bf648e18f9cdf90c9e16b7b819c539be8b377df580960549037eb528c89ae9d102c829f4e574bd7d78ebc5f17ec112559242cab7049
Static task
static1
Behavioral task
behavioral1
Sample
qbrjGY3i.bat
Resource
win7v200430
Behavioral task
behavioral2
Sample
qbrjGY3i.bat
Resource
win10v200430
Malware Config
Extracted
http://185.103.242.78/pastes/qbrjGY3i
Extracted
C:\f03ym-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/D456B4F343071455
http://decryptor.cc/D456B4F343071455
Targets
-
-
Target
qbrjGY3i.bat
-
Size
198B
-
MD5
cbbd8b182519724730053b25823337b8
-
SHA1
627c36d0b7ab667bbcaced29b565bab53b874bbc
-
SHA256
860285cbcff21687d85561abf924d2339f21a00b026da8a8798f6779f7ce70f9
-
SHA512
2a3bf826ac1a0ce9365b4bf648e18f9cdf90c9e16b7b819c539be8b377df580960549037eb528c89ae9d102c829f4e574bd7d78ebc5f17ec112559242cab7049
Score10/10-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Blacklisted process makes network request
-
Enumerates connected drives
-
Modifies service
-
Sets desktop wallpaper using registry
-