General

  • Target

    crypt-domain.bin

  • Size

    600KB

  • Sample

    201120-mjd6g2jrde

  • MD5

    f0db9243fdd14d4755f5b12860d0394d

  • SHA1

    ff1b6fc9398035917e232352fbfae8db7805b5ca

  • SHA256

    8c716101e118ac65d7bdb900e0100d012256abb1d7cdf64830e5943a795ccce2

  • SHA512

    824b21d96fa8ccdad18a8af1aa2dd234fb8c8487a6f81d9b98bdd4108c1ccfd28042b4c3f8bef9a74fadbc22853cc027ee4601f30928fd4ad611f2a38562e96e

Malware Config

Extracted

Path

C:\kbsk57vs-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension kbsk57vs. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/AF81B729E6CF6FDD 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/AF81B729E6CF6FDD Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: dAj3XcBlBXGB3GL6KD11sZ1IHqkaQ/dIU81fT9rm+D0e4/KVsOcWhr8X+5nKJYwV GnPjB6ZuokdwcIDeqlaPR54qNuNhFWqlACb7pdHQMYMSekYZR0QqNr+PnnrWymOB kKnf9zqH7RaNbdckvfbD3/GaVp8xjZ3LDmHfCzVV/LPyN/IxpThfdkFEthHwW4hy Z1Vz2FoTibFD2BqgXYEEF798ZDbjLehZwvHIqBbOKTEoggoFobZxfgI/t2Tbvrff IXVSR+vcRchf4AFj+LLDfpDUDJh8N831fTFGgfymVY6SWPyj5cJkFlBqfuWXNTZl YxFdov2xoXvt01GUkug9GE/q7G5hA/7SXA630iWGouUHo9PT/6HNEHeU8Y22d/Qt PrnhBp40njBH08rw82tsLJqJEfxCZiJBTnwEFbuslv10UH/QqO80e0vnrVkfT9C0 VAoKXUhX0IblTW7n5MunfNl/FfjwjkFfdBEQGHxu5GXUZkOcdCt6WNHL6CJTiOiE tZ3C5boujMagxnxaFEEYRxhLyAFkCBiz/FtE0KLvHBgPGSZTeEEvoaub+Wb+WX8e BiPOiRyW0F0w531E24SV9nEk6Goy2OFYpzlAy0LHxqWSjIWXg037a09ORr20o5cW GtPYp4SYV9VjPyqdVrdKJa7FX5Nizue89QwpHixLTeNX0VSQQJ3f72LrSZi6Stww ouCBRnH35h/f3yNHx8jjp6wF4trwzmcWrPIsXWDZ97OtTtR/8NcHyKTWS29ZhTfp hcnYzKzgUK+1gPykuj+HW0PYefDd0DqS5lngsSHiaPKLjEmTNyic3xXeAH/pYzmD OHeUsbp1DhwA78E8VZJeN1BJySLYvC+qW99nFrNzOQwx0kFzIIdhPUpR1+V7C0Bq lHeKnRL3DWTPa3Kt4bvmYooJMDGx9Ii8lRK/rtTnxkA40GZ+aN9HcyzJgcffv1Sv iC7voUvLmKww7rF9Bo70A6ZVU9Un7eWUu0lyHEU8iMZ1Aag0xJOJKCme+Mv+6qzj bRf8hxPhqm/pc+G2zzAhd+Fsaj78SYvF/aukhPV2dc55qZJJe7eg3EsQFEJHTQ6h q60fSMU5psgc9DU4nBfdx1HMu+TGSyfYM09xMRIIexuTce6SEU+jG03PLU4ameW6 dfMOK16zZcDbS+QsfphIOeVaQUAOzs8uc1CuOs+ChVP+aJeXJIdXXegMeZMOtfPL Tw5uN1OdONf3E7sPpLaP2iz16hBxeQrFxbOsylzUHLQfnNcQVOlovfKHjyjrWhsU 6zP38FF38cHVgi4uIc9hjhXoCzk= ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/AF81B729E6CF6FDD

http://decryptor.cc/AF81B729E6CF6FDD

Targets

    • Target

      crypt-domain.bin

    • Size

      600KB

    • MD5

      f0db9243fdd14d4755f5b12860d0394d

    • SHA1

      ff1b6fc9398035917e232352fbfae8db7805b5ca

    • SHA256

      8c716101e118ac65d7bdb900e0100d012256abb1d7cdf64830e5943a795ccce2

    • SHA512

      824b21d96fa8ccdad18a8af1aa2dd234fb8c8487a6f81d9b98bdd4108c1ccfd28042b4c3f8bef9a74fadbc22853cc027ee4601f30928fd4ad611f2a38562e96e

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies service

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Modify Existing Service

1
T1031

Defense Evasion

Modify Registry

3
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Impact

Defacement

1
T1491

Tasks