General

  • Target

    SeycRmVp.exe

  • Size

    116KB

  • Sample

    200922-5kbg7q8lkx

  • MD5

    7ec9d06ed280e25df7d85d740f21558a

  • SHA1

    946746d1163ce772b2a72b67db3cadabac2ff1ae

  • SHA256

    1bc9040cfa3738e8a2e0409efb17726c8f4894e462f2e51d2a18664c4c799e16

  • SHA512

    e16702beebe37e69b6146d49376ce29dac50cfc510ecea0690a63ec2b139c6123ce2320d7f0e6d35ba97185a19f98087a551b20e1e68bf32a05f609783aa65d0

Malware Config

Extracted

Path

C:\s82342-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension s82342. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/3AE94F9F0A8282AE 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/3AE94F9F0A8282AE Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: vbf4TYGU7IH+PnBHUFrB+upk2fo5q5mEysid+/HCJPm4LT+3NzRn0jzFCHKdGBO8 KmPsgK3zQgkJCQgg/HLhwJRqbr66DJ0iEJMkNdDE9eZYHYPeRNNH8CA3oI7tDvPt B+5NZoIxe2av2rxy2i6N+y4nzJIIdTvzgUk58OG94gH+wm6/T9XQIYufKeLQSgS6 JzHI98+P0pQQbViOpGr9IaYSpX0xDLR1WdblpwMVpuYxZAhT+/MvAHyEHtOjAUIS uF3oIZEcXa0GwpriHh6r+p3YG4z0+Wfwpc/SnEbmnYfH4gzNLbaVyT6RteVpKfnu jYHo6RRlkP9ONFMV4BmTAKJx0sY6PwfiKqTfTfBLSyn4bTRSssBEFK7RtKFoCkIR 2Rck225EqadadCGie7dvi99118Zm6r/e2xN1VtKkXeOphLVtoSRrnuEA/10uYBfZ 4Z5kkSfjZZmaLX6iTrF3lACj8iNf/+0fNT9ObUzaJeLuWvtk4IDWW1Qaw/whAbjg bluI31iJqHxnu4vLNj/fLpdzMidXKTNBKUtVCmVkrhBA2Hbc+tI1nyafacdZwQ2y m8mw5mejdCH/QCrIwIxui0eUa4xP7YktKMBLozPZqIBSs+U0UFVojlyi8tdzo+4B +9xShsejvhgrPZ9fYu6dBAaAdSPOHjOex2bknqFNHEoDxrzGxWMvEJ9U4BLrYgim rs/2PCgCX1K27BKCgCu7HM3Nf/A1Y49uE61Xxk/0QZ/FVP5y4OnAEZS1mpVKFgJd MihtyC2r5SXSomXDq0anOdNuQcyTFggsQ2VHSPeaITum9ZS+LJjWBRVy5zfN41so InUPorF9FPML2bV5MXFMTm60W8doJ3hNNziSxORuasH0zyld/7J7ScSYzajR+2Tm 3wlN1UG8xORNv8Yjqs3UdErZIbVBHvatlFVxztXRkUbuHqXPeF2Pkdbec4eOohAF sEcpD7BwOBeJXjteP79k+6bUSns8Glj6DH2l5WbYk05sO2ZEtwC/J/jZaGXkdyBQ 8Pw0wmuzV8y3Gp8YjPWGiTRpUm/EvdkhjNQloPWaoJitcNbV3SUdU0IO5l1MH5Ud VdZO3PqeMjY1/IjlXBhmtZPQQEfioyGij1bNwWiSmFapxFdaogWan7e1pSkYyt3e 6iAY+D/JvlM56XCD5YkYG/KW1mvoUF4RIuOA8U9af+8KS9ObvTAlvGm+5zV6Mosz tWmLlOpfu/riYjPzMmQFQV5Iq9Iutiulh/u8hSXFIOE5mLL520uVFCfRzVKkf5gO 7z6IEqo1Xc2JMTsZc8L2tw== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/3AE94F9F0A8282AE

http://decryptor.cc/3AE94F9F0A8282AE

Targets

    • Target

      SeycRmVp.exe

    • Size

      116KB

    • MD5

      7ec9d06ed280e25df7d85d740f21558a

    • SHA1

      946746d1163ce772b2a72b67db3cadabac2ff1ae

    • SHA256

      1bc9040cfa3738e8a2e0409efb17726c8f4894e462f2e51d2a18664c4c799e16

    • SHA512

      e16702beebe37e69b6146d49376ce29dac50cfc510ecea0690a63ec2b139c6123ce2320d7f0e6d35ba97185a19f98087a551b20e1e68bf32a05f609783aa65d0

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies service

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks