General

  • Target

    f63307d927f76a7440257534e6f8ce90.bat

  • Size

    220B

  • Sample

    200805-mhhkbtf8ce

  • MD5

    5cc2898f29e28db6519da57795c9e09b

  • SHA1

    415d75288386a5a534fecc039e479a8092f8cdfe

  • SHA256

    87cfbdd18095373e4e2674283270a2f829cb9d025556397ea5738eec62710ed2

  • SHA512

    6fc920fda753894ab4ae3c4856d867ee41ea1eb61fdad542fef8c0cd6358008386f6894138ee45775fa11d0581af76172e489faf0aef6fb6bfd30fade4a7a222

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/f63307d927f76a7440257534e6f8ce90

Extracted

Path

C:\848c2y63y-read-me.txt

Family

sodinokibi

Ransom Note
---=== Welcome Resolute Investments ===--- [+] Whats Happen? [+] Your network has been penetrated. Your files are encrypted with strong military algorithm, and currently unavailable. You can check it: all files on your system has extension 848c2y63y. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). Also, all your business info copyed to our servers. Personal data and business contacts extracted. If you do not take action to contact us, the data will be published for free access to everyone. As soon as we receive the payment, all data will be deleted from our servers. [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/ABE4F1C751DBE10D 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/ABE4F1C751DBE10D Contact with us in chat on website. You have 3 days. If you need more time to make a decision and collect money for payment - inform the support chat about this. [+] How will the decryption process proceed after payment? [+] After payment we will send to you our scanner-decoder program and detailed instructions for use. With this program you will be able to decrypt all your encrypted files. Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: 1998Tj0bVuLGs2nybI5ub9Kqwx7uE2/vf94dYzPncZTwKHcp6/xDe+9pCSFxCCz1 eHhHunS5hixCpcDj+PwFlPlsjnqvIfREDvZbq8wKUhkoqOuVC/WG2QSrYV3fMvtg GBlzjz9c61nhFyuj95in0KzsLqTEXa4TnSOAMAq7pcKfqNwT7zaOUxmSlSC3IFaB +kd+IqiMZeEX9ONSLPpEb7uMShsflGSVnxjBJNVbT3UgJXVb61NDkif2GdeeC3pT jaEcpKsLrRHDIDYQSfjdCT5laQbBv+Fi8L+8FHw+h6t1bj3ETVSe9LaVOiNubifo wfWqeqojl5Xi3oOMK2BcsvZ4AhOCpw5EXrTlcuenGUcN+ifPPpGGWmXdAgtV/4sk 30yWklWK2KUtDI4Q13wfMKT9aMEzT9jaV24bCZEp4linBV+OkYGlznxdKL1oX6kK 3OCa/ToImuOGzo0JzSGpceZ50KjEO6XP9lU6V181YpOluce0c6l7Bl6nXRPaTKry cL1W5B4KLUJNiLj/nvAf8FwrvExUp7jrQgPyaWhr2vonvj1rroJeQNaaaYPE4U/D WnnjhOqkXzag2AEB83VtYye4iqvSbQpQtOuI3wIlOqFV8gCgEjxLHI5ue2Cod62Q cMckREggrloTS5E6MsIYB8kVQXuqB58KEggceW76iyvhQv2tgBVU9sL9ZrV0QArf fF4vNHV9K4Th1ZbpP362G4+n8LxFDbdp7msMglebwJ9V503/AVHy1GyCDCRW2NFx EZdq78/Cj5fCvv8/bfv3DAVAhNt7LwtiONZzwjTduuiy5WcdLiiUqRVzFR6dmats X+yD0TkYU6iRU8qubRZjI/H9m94sDK44OrFucgEpbYAS5WTOWycKejFEUZekKJgu 5dNkBYOhnFxbY1Uvk7WZLJAR1ag3RWSj8DemYGLxssBMOgrerktyCupGtrxhyAFz sbP5S6wbTaoW7dK8tKGhNuIqgkpRpYUY2+28vW/0WaalEeyOKSU/JvBYv8fQAq9G AYDcc1PYW8sCxroHEeCd8kyAxLBeep8b19inznOO6Ok/+uylBYcB7Or2gyVf0L47 bqU0zfhko1zYBYBWwNRqUmgmMgKjRNzTdqc39v66ln5GspFwnT3g7OxXRkkmHxaO k9DUJtcVeHadMGKw2q7U+2kvVmGsK2FNv3jVA8C+Y2hScz1BjtwBPsHQunFRjdG2 deKL9zmzNkWiZ5PjwMui/gEsL1iQ5gEQjemWppRGNhRWbBr5+w0DB3HQZuzPiO3z fdBRQLaume+YsQLLZWel5MQ+ZZW+SwYt3gv4hC1IzmtUHwmj0AM= ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

Targets

    • Target

      f63307d927f76a7440257534e6f8ce90.bat

    • Size

      220B

    • MD5

      5cc2898f29e28db6519da57795c9e09b

    • SHA1

      415d75288386a5a534fecc039e479a8092f8cdfe

    • SHA256

      87cfbdd18095373e4e2674283270a2f829cb9d025556397ea5738eec62710ed2

    • SHA512

      6fc920fda753894ab4ae3c4856d867ee41ea1eb61fdad542fef8c0cd6358008386f6894138ee45775fa11d0581af76172e489faf0aef6fb6bfd30fade4a7a222

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • ServiceHost packer

      Detects ServiceHost packer used for .NET malware

    • Blacklisted process makes network request

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Enumerates connected drives

    • Drops file in System32 directory

    • Modifies service

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks