General

  • Target

    9d3a482d9441876096e0cee429fedf7b9f7e1c6a50b3e4b2009884019627d879.bin

  • Size

    166KB

  • Sample

    200917-plwztf9w8n

  • MD5

    63ae6ca6853552716571555546833d99

  • SHA1

    09e37e98a74ec8edb36b22a4eb51dbed4390544a

  • SHA256

    9d3a482d9441876096e0cee429fedf7b9f7e1c6a50b3e4b2009884019627d879

  • SHA512

    087baf5fbf764f480f384cbdee878d3dfb8b3880f378b4597d5e292f392341e5da196ee2232a441c6268b7760afffdde293f35f536ee55cff4992b4b45238f86

Malware Config

Extracted

Family

sodinokibi

C2

employeesurveys.com

izzi360.com

centromarysalud.com

coding-machine.com

schutting-info.nl

ceid.info.tr

eglectonk.online

tulsawaterheaterinstallation.com

rumahminangberdaya.com

buroludo.nl

labobit.it

steampluscarpetandfloors.com

andersongilmour.co.uk

satyayoga.de

sotsioloogia.ee

oceanastudios.com

cactusthebrand.com

danielblum.info

cursoporcelanatoliquido.online

stefanpasch.me

Attributes
  • net

    false

  • pid

    $2a$10$QV..IaQ6B9QV724W3myufeRDO8uuVgVqGSa6eDWdTrsJ1a32XBdh.

  • ransom_oneliner

    Soon you may lose your files FOREVER Find: "readme-{EXT}-NOW.txt" in folders or on your desktop! YOU HAVE A FEW DAYS OR A FILE WILL BE LOST FOREVER !!!

  • ransom_template

    Your files are locked due to a vulnerability in your system by "{EXT}" extension. You will not be able to decrypt the files yourself, in the worst case you can destroy the data irreversibly. The only way to unlock your data is to buy the decryption program. Go to the link written below to more details. If you cannot do this yourself, find a data recovery company in internet. They cannot help you unlock your data, because only we have decryption key, but will help you make a payment and provide you guarantees. ATTENTION! DATA RECOVERY AGENCIES WORK AND DURING THE CORONOVIRUS QUARANTINE, THEY WILL HELP YOU REMOTE. Also, I ask you to note, you have no long time, if you do not make payment soon, the price for the decryptor will double. So I recommend you dont waste time and move! Go to the page through the browser: http://decryptor.cc/{UID} If your site does not open, then download the "TOR Browser" (https://torproject.org/). If you cannot access the download page of the "TOR Browser", then download the VPN! After installing "TOR Browser", open it and follow the link: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} After going to the site, enter the following code: {KEY}

  • sub

    4402

Extracted

Path

C:\readme-w6nk8a0i7-NOW.txt

Ransom Note
Your files are locked due to a vulnerability in your system by "w6nk8a0i7" extension. You will not be able to decrypt the files yourself, in the worst case you can destroy the data irreversibly. The only way to unlock your data is to buy the decryption program. Go to the link written below to more details. If you cannot do this yourself, find a data recovery company in internet. They cannot help you unlock your data, because only we have decryption key, but will help you make a payment and provide you guarantees. ATTENTION! DATA RECOVERY AGENCIES WORK AND DURING THE CORONOVIRUS QUARANTINE, THEY WILL HELP YOU REMOTE. Also, I ask you to note, you have no long time, if you do not make payment soon, the price for the decryptor will double. So I recommend you dont waste time and move! Go to the page through the browser: http://decryptor.cc/BF0BAB5EF88A0393 If your site does not open, then download the "TOR Browser" (https://torproject.org/). If you cannot access the download page of the "TOR Browser", then download the VPN! After installing "TOR Browser", open it and follow the link: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/BF0BAB5EF88A0393 After going to the site, enter the following code: bSWDNlB/4HjDEVl3CTLPzT7HTm81TQzz0jRbBkGLunjyVZxH0/6bw4UwtiFsldjB op3zFOMHaLiw1xqZLhxztmLGAwFtC29ErRZ9qweCAMhKFhFtFdeciG9C81vS9y1D AQil6aTdoGKH644S/iVqO/gcgG7022nLfFA0gkusTNLw6F5th6m1PSLK32WeLKly 7E8E0NXWrsYvewbWzLRXSb6KhkkJILoyZqvrnkZMSpR7lfqI6gQiP3/8F0kZm1O5 PiN8zYM6QwWuKXRESwcszJWYk1iPGmjIyC0bhL1aaftAXGUe+10LDTa5vsJuutLS lQhalufMxfvv4EIHAgi9wdbEXyhpucOU/gMTVLGkfLFM7nNT1k8kAieF0KraKi+7 1VYInNp3sL7UYMkdAEVpWrukHDb+HLPlJoYwb38PYEjljDlCL5KKygOaByZNu07h iUOqhY685IQ/SK4+an/5J50mYgytEF9ggJEGJCxZ4XvpsB+B9HdJ2TVJp2T8V5zn ai7HHQCdXfpXqUWe/ARJ1McdHrI8aVmAXncuHcqoU4rMkwI5eMMF55tAHPyOKwNk bKq7uXlVY9s5tQvNuyhJ3tVAx8BIPdJlsF/2Mg0TBYFD/8IJMoyj9I74BN7qZKxY x2bd0ppD5cgdHrXPbuoCNFRBsP54RUmIfPEi3b+k10CPWq/fRqJ08NXF5rEsmvmL c3m1yXujETS5wxEF/hqC3TlbjPsFIqTCbfvSJ/PKQ1PJ55btymixBJ2Zpm1tlc/g mWJLe3OeO60z6mV0JF2Xy89M7HRFLIWTH38m1tkYrVExWXg1i1XCGZfOMDX0LWT7 3SWE4wvybWHHFqkTaeFgF/ISFykXUNn2MAkmAJmgHj6M29GedP7T7YWsjseRplRY tm133HyD2Y7GwAT9zXQGEqXYbkPm4Qebpehj4ARZShCp1x+S1zCVt2xZd+jGDKX/ sQ5OyGfhBsrWx1fSRkAqyKZvgIbXAEnmUzZ1P4YPiZlYnUykWH2pOV0lIvwNUXwz D1CAQ6L+k6imR9/tfZz0JOnQnOSHCfvR6OWd42hQ3Or8w+UAnjd+VW5VewXZDNzS l3hVY4YKdDEav/Y1Q8jOb84mYPSZbCo9RtnrtZ/GC4G21+3Vgyh/I7UBjA77wPHB cPM/pQdKUYV6aOfhLm/QBjW2CKSx6AlCWbq/CuCP+lbRfCWBX5vL87Csxxzb7LM+ y2thdVRoZxedRQ5Ccs/sbM3MeBoTS07APUDWTT1evharkwvLHKE1iSWgBR5JtiE8 zmpt667HzSkCnI+oKCeayvAfC9XV3A==
URLs

http://decryptor.cc/BF0BAB5EF88A0393

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/BF0BAB5EF88A0393

Targets

    • Target

      9d3a482d9441876096e0cee429fedf7b9f7e1c6a50b3e4b2009884019627d879.bin

    • Size

      166KB

    • MD5

      63ae6ca6853552716571555546833d99

    • SHA1

      09e37e98a74ec8edb36b22a4eb51dbed4390544a

    • SHA256

      9d3a482d9441876096e0cee429fedf7b9f7e1c6a50b3e4b2009884019627d879

    • SHA512

      087baf5fbf764f480f384cbdee878d3dfb8b3880f378b4597d5e292f392341e5da196ee2232a441c6268b7760afffdde293f35f536ee55cff4992b4b45238f86

    Score
    10/10
    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies service

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks