General

  • Target

    file

  • Size

    166KB

  • Sample

    201109-cx54alfy8e

  • MD5

    3cd7e62bc197926278810ea5f6adff19

  • SHA1

    ad18b4f27039aa3b3ca59b7b6d8ea5cb309d78a7

  • SHA256

    2a28f11ca820bd0bde24d41cb5307c8f2fa70174536ac13a99923ba70015b36f

  • SHA512

    214852706e4bb89464a92625e3594b19afe4c99157d1706493e4114ac5510a64d3af7ff88f09273c67ad3d20f1ead61e8740acc4147432c64755e9eccbac7c71

Score
10/10

Malware Config

Extracted

Family

sodinokibi

C2

cactusthebrand.com

triggi.de

ohidesign.com

travelffeine.com

creamery201.com

transportesycementoshidalgo.es

labobit.it

yousay.site

daklesa.de

besttechie.com

directwindowco.com

conasmanagement.de

devlaur.com

moveonnews.com

mastertechengineering.com

solerluethi-allart.ch

brevitempore.net

global-kids.info

ceres.org.au

pelorus.group

Attributes
  • net

    false

  • pid

    $2a$10$MJ1r/FRZ8IrIWWZ1qhl4kuqs9Y89Joj2LO9aNFDkqDxkAPPgObiHC

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    3238

Targets

    • Target

      file

    • Size

      166KB

    • MD5

      3cd7e62bc197926278810ea5f6adff19

    • SHA1

      ad18b4f27039aa3b3ca59b7b6d8ea5cb309d78a7

    • SHA256

      2a28f11ca820bd0bde24d41cb5307c8f2fa70174536ac13a99923ba70015b36f

    • SHA512

      214852706e4bb89464a92625e3594b19afe4c99157d1706493e4114ac5510a64d3af7ff88f09273c67ad3d20f1ead61e8740acc4147432c64755e9eccbac7c71

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • ServiceHost packer

      Detects ServiceHost packer used for .NET malware

MITRE ATT&CK Matrix

Tasks