General

  • Target

    139a7d6656feebe539b2cb94b0729602f6218f54fb5b7531b58cfe040f180548

  • Size

    157KB

  • Sample

    201118-x9836dnxwe

  • MD5

    b488bdeeaeda94a273e4746db0082841

  • SHA1

    5dac89d5ecc2794b3fc084416a78c965c2be0d2a

  • SHA256

    139a7d6656feebe539b2cb94b0729602f6218f54fb5b7531b58cfe040f180548

  • SHA512

    2b62f0e0b017ed3d2dc7103d2020604f15f95449ba842bba18f886f9e1dcc977c459c53d1e6e7abfe6b99fc3dde24f5cc7a848c92443d1daf3574ef6f0263284

Malware Config

Extracted

Family

sodinokibi

C2

lyricalduniya.com

theboardroomafrica.com

chris-anne.com

ownidentity.com

web865.com

paradigmlandscape.com

envomask.com

scentedlair.com

jlgraphisme.fr

andrealuchesi.it

mursall.de

letterscan.de

metcalfe.ca

dentourage.com

chomiksy.net

yayasanprimaunggul.org

opticahubertruiz.com

affligemsehondenschool.be

zealcon.ae

craftingalegacy.com

Attributes
  • net

    false

  • pid

    10

  • ransom_oneliner

    Your files are encrypted! Open {EXT}.info.txt!

  • ransom_template

    Hello dear friend! Your files are encrypted, and, as result you can't use it. You must visit our page to get instructions about decryption process. All encrypted files have got {EXT} extension. Instructions into the TOR network ----------------------------- Install TOR browser from https://torproject.org/ Visit the following link: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} Instructions into WWW (The following link can not be in work state, if true, use TOR above): ----------------------------- Visit the following link: http://decryptor.top/{UID} Page will ask you for the key, here it is: {KEY}

  • sub

    7

Extracted

Path

C:\odt\62n690ip3.info.txt

Family

sodinokibi

Ransom Note
Hello dear friend! Your files are encrypted, and, as result you can't use it. You must visit our page to get instructions about decryption process. All encrypted files have got 62n690ip3 extension. Instructions into the TOR network ----------------------------- Install TOR browser from https://torproject.org/ Visit the following link: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/7E4CE5FC33369BBF Instructions into WWW (The following link can not be in work state, if true, use TOR above): ----------------------------- Visit the following link: http://decryptor.top/7E4CE5FC33369BBF Page will ask you for the key, here it is: IQWTTIX3GXJa+DY3YSd0SuARrD99Z1BviT/LijIzyB4sKz1yX01EqH9uLuXPeo8M l8uzw+ODCFrhdkgPQ2Ab4qVNk2hbEd6T0li2mGGlWvcaGLVMyaZFWnkAedI1NAfa GAHKtEEMrYa5YbZAJpm3e72fh/r+T3EBu4/Y6lDg5Bd/6bT0aLayaY0Au3CRtpWG pBBi5bknC2Kv8xiYyxnNexU4duXeIDPoACsh52guZp7KvFh3xrIMddwdBLmH9vMr iuIfIpZHGFXl0Hxn0B5/QeOFFnQnAFK1Bbwah3hczDAscL2+pGvtLyQ3sHtDJRUl N1VEY5ogQI8DvYyMHcLpB8CdCmUkbw7av9Np2jB6v/R9GkzuekXWrKuVGNC5cdXs oy5pPCfZFXyzPx05ir7BN+p9znXR/ptkNzSglpf3uW04hMyzejAQex91Jmh4AKCj eKlHJWOOLqvcejR0G8VJdynlVWGXf3UuxveHFqSx+AeCATsdgRplpELoyDjOou+f Af1WRzMIGxOgVy8UuU+h2K0PIMvKHjErst0W+EpPT0MgMQGnbfB5xWvO4wF5eYS7 IQmPaiG3g4ZN4B6YYU86IBD3RFiupke8deA8vFNh/xsjA4+PL5b1psLN5yYVIGwi 2V6tqJDOgijwpZQmDx2iDKx4wCNuUrJBtc05puSq8e3e4DxdIDBxbWJxQRSL4tos ncvz3cCd9wehVxV/ZuzTjCeCdJtxplgBVBmcHHwQnPdjm1i72/I3kz8HFJ3CENCo mQHF12dawGWVvI7t0NijdCdn/Y8Ot94sbHkIUqrAlkFbQCubScMR+lcF1oLenX0P lxFWUC/q696BPDiHRIu6TcimjygH/Ua5YXYOdyT408PyBSg2mmoCq9eCTFkpSbDU hfdTn/dGH7ZufXQuEtfsr0VEaKsRL+nsGRMcrmgsajVGDDe7R0o1xRm3qaeHCNkt p3bU1ZYXyr+88f54W4VyliR+K6oupT9FRMAepdhLNQKnxUpnA2cl1cvnfLBp84CG buF12m+h16sR84VV5rCUXN4b3GEBIpEKYSguyKXSp6q5GHxnYhJMgtLt2or4xFDU QZbta3OtTNA=
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/7E4CE5FC33369BBF

http://decryptor.top/7E4CE5FC33369BBF

Targets

    • Target

      139a7d6656feebe539b2cb94b0729602f6218f54fb5b7531b58cfe040f180548

    • Size

      157KB

    • MD5

      b488bdeeaeda94a273e4746db0082841

    • SHA1

      5dac89d5ecc2794b3fc084416a78c965c2be0d2a

    • SHA256

      139a7d6656feebe539b2cb94b0729602f6218f54fb5b7531b58cfe040f180548

    • SHA512

      2b62f0e0b017ed3d2dc7103d2020604f15f95449ba842bba18f886f9e1dcc977c459c53d1e6e7abfe6b99fc3dde24f5cc7a848c92443d1daf3574ef6f0263284

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies service

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Defense Evasion

File Deletion

2
T1107

Modify Registry

3
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Impact

Inhibit System Recovery

2
T1490

Defacement

1
T1491

Tasks