General

  • Target

    e0b8bc41f54e982571d878303f3714a2b71985e37abe8f2c84c04139927b31a9.bin.exe

  • Size

    116KB

  • Sample

    200820-z63cm8v8gj

  • MD5

    d88e2100c2ac44892f475fe54deb89b9

  • SHA1

    c9fa8beacf4dbd9af7c520fd7f3ecc493acafbf8

  • SHA256

    e0b8bc41f54e982571d878303f3714a2b71985e37abe8f2c84c04139927b31a9

  • SHA512

    b92c85f5a99da1b51878778d98d75a3895e048c80af678086252daceea2b72922b1177122a57a58891f9defd38e64887af1ad849074ebb4dab28aec0b305b592

Malware Config

Extracted

Family

sodinokibi

C2

consultaractadenacimiento.com

paradicepacks.com

bayoga.co.uk

baptisttabernacle.com

unim.su

tinyagency.com

gadgetedges.com

baumkuchenexpo.jp

allentownpapershow.com

lapinlviasennus.fi

perbudget.com

ilcdover.com

caribbeansunpoker.com

reddysbakery.com

marathonerpaolo.com

retroearthstudio.com

notsilentmd.org

humancondition.com

xoabigail.com

oemands.dk

Attributes
  • net

    false

  • pid

    $2a$10$9waF7Sp3ReFJhMzlkgpPvuYuEIXkpTVjSwvUyfsSEjvIMFxHI8.km

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-read-me.txt and follow instuctions

  • ransom_template

    ---=== Welcome Total Military Management ===--- [+] Whats Happen? [+] Your network has been penetrated. Your files are encrypted with strong military algorithm, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). Also, all your business info copyed to our servers. Personal data and business contacts extracted. If you do not take action to contact us, the data will be published for free access to everyone. As soon as we receive the payment, all data will be deleted from our servers. [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Contact with us in chat on website. You have 3 days. If you need more time to make a decision and collect money for payment - inform the support chat about this. [+] How will the decryption process proceed after payment? [+] After payment we will send to you our scanner-decoder program and detailed instructions for use. With this program you will be able to decrypt all your encrypted files. Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    5161

Extracted

Path

C:\9g1io1s7v2-read-me.txt

Family

sodinokibi

Ransom Note
---=== Welcome Total Military Management ===--- [+] Whats Happen? [+] Your network has been penetrated. Your files are encrypted with strong military algorithm, and currently unavailable. You can check it: all files on your system has extension 9g1io1s7v2. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). Also, all your business info copyed to our servers. Personal data and business contacts extracted. If you do not take action to contact us, the data will be published for free access to everyone. As soon as we receive the payment, all data will be deleted from our servers. [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/178BCB8E629819B6 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/178BCB8E629819B6 Contact with us in chat on website. You have 3 days. If you need more time to make a decision and collect money for payment - inform the support chat about this. [+] How will the decryption process proceed after payment? [+] After payment we will send to you our scanner-decoder program and detailed instructions for use. With this program you will be able to decrypt all your encrypted files. Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: 1uWikntwlJ2mzvW1sDTXi3zj5RUT364xwkDvvU8a4vch6cIEkHh9QtfZrl69b7Zm Bjp5ztjY0aRTwhC3KScQ87ods2s2VI8cYLPwt5Wjenel/ahA8ndgU4yt/mnREaau wvkj0eYFVqu4dBvzSmdmpVVJ18lz8PSwlGvGlL6UA4ThYe5XOZLx3V2QZYFeAAL+ aklWLK6LHonuIsiS2xMVlVhbY0YhP8qMSrNRaTfV47YO5azt7LMetO78ae8xwmCU evSYaUiuo656BwbnTFTXnVBxTeD57/8AvE6IUvdUotfQYOGTDPcs2vlkNzFED228 T1MvmB/DygJIUfP00oFDIczaZfSl+TZW7coSGuOzsOy834EC6Jy2LcSW+eHXZcFa X2axaDUwAc6qcs2e5DDNb4r1yDfY5hgedFZW7Rqjg13jeQHde7aoO3geZ0ssEmtS SA6Z8GMs43NtrM3PN4b70OO3yTVUD8FUG7F9ZfH9IQx3wza6NtSxNzcfg7cg2mGS 5fY/1G7zduJfrqGhtAh2DZ00eMQF9HvkdwwaW1ZPYcpDofulMmXtTrqCVfs5IUDU +iol5u/8SxbzEa5mvo3L6tFYb328bWorpmwFblvjRpBD+moS75alQzww9HMcnMNo t2bwtpnfhct1YDUXZKDNBjX2U1VEP3N010IlFAFL1vPvRyLSMMmLXbeevDV+A8QM jdnPhZcta3bELkmxrJmOyjqNehE7l6Si4tHc4jgNMRkYQjWEVZ8IgbGQSxUHjZak BpFobznQ85qTH4zRcnv9qCA1icvsaj5/rOIjVzAgcUDcVJoStNk4WjmtfDypOA0t 30mT45QsGElcwOxkSMI5TmmKkwGhf0z26MfYa0FZH/nlHHN+LHv3rJ1kGaUbF3x3 b8wUXMVppmNl3OLny5Z4P64gvOhUXQSrnatJIbEbGKZTNIWPDuCQ+ncmqQufMRBt V9/DQHBiVXwtvM7WkfkgsHecBv9ZdrTEw8iaL3yMJ4sIOBJ8ziWGQfu45Tpk8XF4 4gmUfG9T1ZcWmKfRxJ4KZ1YAvyd7eUL+A17/TUsxb2TJaj4L3XABwk3U1/1gZJjw 3ZwvMmNXt/OAJGpRLH9FQ7hSn7laJE6DnL7jA8BVxTg3PO170lNgNEx9hAuP38R8 UK4UqE4Kqt1qfwzKQQtasI77FORvZkbAGwIubB0w/w9IEDuc0asLEY1k0AfH62JZ DJt3lcaaL2XLSOzdj4xomtmWL3Y06WH+gBp246nF/4z2BQdz0UNJpEDl6rNF0csD 3leh5e0ywqedAwk+G2K1FyKuJV79zwvYiBfvzcoaMUdu0adqwWOUZQ== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

Extracted

Path

C:\zo7r8-read-me.txt

Family

sodinokibi

Ransom Note
---=== Welcome Total Military Management ===--- [+] Whats Happen? [+] Your network has been penetrated. Your files are encrypted with strong military algorithm, and currently unavailable. You can check it: all files on your system has extension zo7r8. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). Also, all your business info copyed to our servers. Personal data and business contacts extracted. If you do not take action to contact us, the data will be published for free access to everyone. As soon as we receive the payment, all data will be deleted from our servers. [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/E16582DF25936703 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/E16582DF25936703 Contact with us in chat on website. You have 3 days. If you need more time to make a decision and collect money for payment - inform the support chat about this. [+] How will the decryption process proceed after payment? [+] After payment we will send to you our scanner-decoder program and detailed instructions for use. With this program you will be able to decrypt all your encrypted files. Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: cfF8EFs8fhsDbJfInPXfvxCXOClPDdMZOTUHCKSjYKcj5aC1fWB8cOGckgWsymB0 RMjUKerlRRz8iyM6lVmjKXGPcwqKJhDPtWxdA3T9loJeBKLTlPX6bp9++tz7vP8r agqeCx26z0Z8hGlafJOz/V9IRdAxdwpm5+Ek2H7GN1aUq6wI4nPW9DHV0L6Nt921 lXCsRJyUqoGhxD3oofXHmB/lQyV6zuL+1H0AzNA2GF4gNOqZpEN6OE79oVNYHVDP VqT5SnGivN9JZ9dEShJDl2noRhcHwdrb3ROdN/5Yz6vzLAoqbCjj1EPruiltlgY9 Y+lM7jqIm/K0pgnJCOHvqXFL3xQwGnIThu4Hef2M6bz5ijxI2yde2gm7VIcQLHpT 5kuLAZFSzZqSIK6BeAH8HZ4N5pqVHlff3D0mlFy7kdiRvw7yRGkz558sOknetj7C 3KqLiobuR5sTwfim8khHRypYcjS3mcGtxbQbZzkDuU0YRxHOOpKAEm1TzZS4hgHX Rx2QlvuDVbVUCnYV/6akqvMtSWBhXIWq6yWKab98r4TDCBWWbB8RMbQer11+RHKq fRNFaaBwcRJR6hP6X8ni8UhL8yOz3CcPoVEedXXmCHuF1UFxup9rUtwdEU4WfAj8 P27Ael88tlxhk3qjz5jsTypZjO81/jGNpKFTxjInReEPKXFKpvJZz1P7KRRKvxJT TVeCXHQRYBXHvA2I6GQvjopgVT2T6pnWeunodC6liWv+gONmaERzirR7qYfVPaZu TBuqzq2txKHRpXuAB+30bD9DPX+wZg+9PS1gt48p8cs0nKA+jIDwHgZCHgQ4/mj8 gH9OSnvaBHzugM6r4gjsNuxAAcIQskmvCkCmKcyOldsXbDfZGBxswdyzk+Nx/9lj LcS4YiHsk+H0v3sdvOAhJgDlpWCw14zIMqxRuNzIKKkTapRSVeoGTAiTfvzsHXJe cTdnz+1gIJHuqVCpzWQxY2/q6TtiTCYcCOr1IvHx5DZUuxpWVV4sDAYIFZBd2RsB V+q7CsRw+P0ygjdB9LpxHELr8nQ55IcyRS0BhcS8a5R8sFdF4BHfItk60OJ0r9qe 1B5uk+zVsQ08btd2lDvx2qQ0tTdNKvYjbhxwo599w2LM6rZwqftnHobbPvWE+G+v yklPZj+b9CzgYPwfn7grEo7wGjHNrWVPX0ZrTc3SBT16u0fi/PRA0oDg077i1de2 FC8RWjsMS5VpgzQ348uQqTIn4nQ/rEmh9Wf9pRl8OZ1lVjhnAKPYQ50uYGkfmlpv FpglFOVA1zBYmdjGZ9Q= ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

Targets

    • Target

      e0b8bc41f54e982571d878303f3714a2b71985e37abe8f2c84c04139927b31a9.bin.exe

    • Size

      116KB

    • MD5

      d88e2100c2ac44892f475fe54deb89b9

    • SHA1

      c9fa8beacf4dbd9af7c520fd7f3ecc493acafbf8

    • SHA256

      e0b8bc41f54e982571d878303f3714a2b71985e37abe8f2c84c04139927b31a9

    • SHA512

      b92c85f5a99da1b51878778d98d75a3895e048c80af678086252daceea2b72922b1177122a57a58891f9defd38e64887af1ad849074ebb4dab28aec0b305b592

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Enumerates connected drives

    • Drops file in System32 directory

    • Modifies service

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks