Resubmissions

18-11-2020 21:34

201118-4xhmwbka4e 10

18-11-2020 13:04

201118-lslj2xq3ja 10

General

  • Target

    crypt-domain.exe

  • Size

    600KB

  • Sample

    201118-lslj2xq3ja

  • MD5

    f0db9243fdd14d4755f5b12860d0394d

  • SHA1

    ff1b6fc9398035917e232352fbfae8db7805b5ca

  • SHA256

    8c716101e118ac65d7bdb900e0100d012256abb1d7cdf64830e5943a795ccce2

  • SHA512

    824b21d96fa8ccdad18a8af1aa2dd234fb8c8487a6f81d9b98bdd4108c1ccfd28042b4c3f8bef9a74fadbc22853cc027ee4601f30928fd4ad611f2a38562e96e

Malware Config

Extracted

Path

C:\hvbozhffr7-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension hvbozhffr7. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/5CC297DE39744DF3 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/5CC297DE39744DF3 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: zT6NNGksU0c0D3jdz8OhZ0f/p3wDCJYdLj9xH7AVbO61XBWhvXAeYGOOVQZ6xPMw 2Ea7i3phXqCxCocUidIyetAL/bGEUAMkckxmytgrKRXm/BZ3oQ7TBexLLtDvSi/8 DJJ7SdbppSTdjjcWU36v0PV9QulzHjUJ/i9TJ6gL+aZ0rgIFFaqgRrdjpOREHXae omtuKL7m7Z5SSvDOLlUQIAIQHAbnkxOmfi6vvkNqiQVIoqnbVCmtMyFF/u9Zn3OK cxCIK7xBI8UKvSzpy84pGlVtjh+uct6xOyHn/mIud3QfVyxZnhcYkoUCoC9vWBk8 aAuYLHC4dws1PmRc8Bzcvatvw4WgmunxzYp1LJPigGl7OD9zEOw0PQFSO15YkzER IjMKpi+yNyjgs+nIwXK4bL3qzWt6Wb++XW4FON+Kr/kEJC+Fq30B9GM/YleiyLHX V/QTRJqDUw20zAMDlIdoqe1M0xNE2bkPaP8ttwZl4WLiXiCnAQE3OCsdWZvBMQt2 bNvGBlX010RNmRTmWzSFz+yMLnAMjS9h6KchZZiyvhIW5mjBZ7n3ORRz2Qkkq49Z 9XJvEJUWMBCKkupPqJ5Ujn8SkQLn7cJmFBdfudOt5pC/YhfBNGl8mJCPh8eTByqo QAP/FWyRkMZYKgl8ITpUnT07oCgzRrM5+zeLljQpgd8zi5CMIxLEW7KsYE7pd5qd XDsD93yUuLuE+MhRyVY4qJ5e8NBRU1/s3Xb4iNJLV22qhIEmpDZT1RjCq38D15hb qf+6hSXLLugyst/p9/XxZR9Bx2UXxqHVk0/VCv6GmNA0Po87BP6DHYssiksaLSES mEBtyLGbM5pteWtp0z0t9qpC/N0Pvog+z2GbMWBCMxy6e/Px1M8n0J+J6NCBzJmt xnfVsKmtB1X1Dsql3+XmVoZNCS2B4AI+SCnijYbIuWVTstQR7EhVY3Ids5mRYapq E2arbIHvPeggKeDJBMrRrTec0nZu2rD/1Q67vY+EMTvE1kWLtvCI07YWaTX+dsP6 ZOd6UAsE8y8iYu6JjL4G0aLRRPTjR2Sh1oT9/osapcNJXr+YpBca+pokaYvBm90x 35sEuhWgaxT8jUzW/Ifr0KZi0An9pHfp7RqaehtH2ULqJEgIZDytM0n7Ee2j9nLA OlJXWS6w0bJcfJfWEw/TMLV4betVprUsMhTwtRZ3/JnhQ+ik6fc262h4dEq3GBvs ba3lfjGxYBlBhPYFbRIxzwzLLTkVDCR74cGhNKMEcbtpMjscn7mv9Z5K9AAveV04 IQJMUmIavWKL5L1G0Ym7YnsNgQclnhsy ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/5CC297DE39744DF3

http://decryptor.cc/5CC297DE39744DF3

Targets

    • Target

      crypt-domain.exe

    • Size

      600KB

    • MD5

      f0db9243fdd14d4755f5b12860d0394d

    • SHA1

      ff1b6fc9398035917e232352fbfae8db7805b5ca

    • SHA256

      8c716101e118ac65d7bdb900e0100d012256abb1d7cdf64830e5943a795ccce2

    • SHA512

      824b21d96fa8ccdad18a8af1aa2dd234fb8c8487a6f81d9b98bdd4108c1ccfd28042b4c3f8bef9a74fadbc22853cc027ee4601f30928fd4ad611f2a38562e96e

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies service

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Modify Existing Service

1
T1031

Defense Evasion

Modify Registry

4
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Impact

Defacement

1
T1491

Tasks