General

  • Target

    ba5ad1edfdfaecc2becdd7f08922be08b37450556a503e3bd06119ba57facef0.exe

  • Size

    237KB

  • Sample

    201109-ktebesavk6

  • MD5

    090ba44dd9f0ca87c9e99aabc79a1500

  • SHA1

    a4ad09c7c175c937a9916aca649b2d90af7ada68

  • SHA256

    ba5ad1edfdfaecc2becdd7f08922be08b37450556a503e3bd06119ba57facef0

  • SHA512

    b2180c22ee09e8daa9be579753ed26db878d32bf51183d0c70b124af28923f3aa66d31f16c65b19dd15820b36b0eecae64e5e0c017e7995faf7829c9b17c1205

Malware Config

Extracted

Path

C:\b07zsr31b-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension b07zsr31b. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/7702081DC2209EA7 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/7702081DC2209EA7 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: MAyoqW6X18rmkeYR/NBlAe/n+2iJvbtrT9Y3TZeUrMm1PtN+49wlfXgE27abzvqK V4Ii7hcEovi9XBxUW3kOZ84kYDa0VjcLAZCPoglMlTE2rryb+octF9HfRtXPkLDo 7gwT3OgpT9UlvSWYuaEwcUAwHEEyupTgLEjhBKBmHi52PmBom3g68EJMkFmFDpHc sFRrU2+Tdt0W64DQPCSYZciAnU95sDvdtRv4giM1dotUoql5qjLjyOFKCyG1N3k7 8KM/k0pSl1bYsL9wxBwsEhu6TdgnIeAMCRxoEMbwYo1bbRaFrRhpxLe/nxulVnwk 1nxaUqgs1JA0A5gu8bpXSKJ51W3HsMDmzyemA3G/vJI7Vwbjba7MzNq75D223tIc pnnmIelP2pYpOITRoXmGPcLD10aOxPu5L4x8fQ2xp0qOf+9elOhzVyVgoJPZyOa3 NDmG3PN8tQZcV57IeAWw/GOZh6wPvb87oFTgFd8vhloAH9G6rvD0zOY+t5Yugb4K DCT20MUps7lnKb1mjsO8humcOwQmUR83mfNC7yATUBKb6sbYfKszYrdmjh0hGUy4 YqIkaFirn722ATG8RWOCTAD3XJcve/fze2paMBDedWfrvbwQx0TZgxEGQr7aBnA9 pxvI3KPZxzViUA55vuLPngH8kvvvwq+RXmbOZ6ytj5QiZ8l/pHtnMCIAXYUo/nrH K4Y8iFnr1n5tZtvumMbsrNoMUqIWaJ6nwJOpb7E/vFooCduqGZFC0gAxkwm98NOx 7eprwkpeGwy8f3gMZBj4MuCo2Cysl0JsvrmkaXgP1QaMylhIfSyVjbJOKtGoFbxx bFnxwB0gePQjwxR/VxrlewMk+PpHLri0Z8EzlUrDR5ssS03xm9KilLtepbweBYM3 QUE+1Xp7W+QTsjTzWn0ySiaHSN9zsxiW1mcOOhBFbcG3yGfxBS34GiAUzy9os7EL j8X9Cc3kwsoHMffln32YXBjfiNeQrh9ROO5jeEeMDcVHax241j+pzPFU7VivxQfn lXXKlvI35sRuqQWs3bkh/gzb5uR/m0OcrTNM2sF7p8WaBWQcIzxKMnSYYUoHBw81 y0goaZhMolBIRZRasMCnTIjslJR5K6dhdHdxWvk+N177I9IG9idlFp5gEBGjAWQw hekUGLL3vnnHOQ9nKxypM51lvUMS5CkAGQEKuEnPv66+lqTlmU8Vvebw14zFFmv3 ZfC2IVJMN2rEGn5ojJkfNf1onyr+5Cl0oHJOzbOfpcDXwgEeFB1ArvlICARptyss DShH9Qzn4Wjj5LeTzTlfiCjikgpRKA== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/7702081DC2209EA7

http://decryptor.cc/7702081DC2209EA7

Targets

    • Target

      ba5ad1edfdfaecc2becdd7f08922be08b37450556a503e3bd06119ba57facef0.exe

    • Size

      237KB

    • MD5

      090ba44dd9f0ca87c9e99aabc79a1500

    • SHA1

      a4ad09c7c175c937a9916aca649b2d90af7ada68

    • SHA256

      ba5ad1edfdfaecc2becdd7f08922be08b37450556a503e3bd06119ba57facef0

    • SHA512

      b2180c22ee09e8daa9be579753ed26db878d32bf51183d0c70b124af28923f3aa66d31f16c65b19dd15820b36b0eecae64e5e0c017e7995faf7829c9b17c1205

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies service

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Impact

Defacement

1
T1491

Tasks