General

  • Target

    sodi_1

  • Size

    696KB

  • Sample

    201223-7ajpgfqkyj

  • MD5

    8445dfa4a84b7045a93cacfd54bbbc90

  • SHA1

    8b2ed1cac7b5cb0b71ef0fc7b4102ea07368e667

  • SHA256

    9c8047488afe121552ac8acd0594d1c677e10373ee1b49582d17dc96161f7feb

  • SHA512

    a791387940729acd0adef7300c93529a16492e0c3fe09f23c03301c7df70f3debf3fe44252bf0da591956492e632b137fdd54bb4afabb37f8f06aca132c81f14

Malware Config

Extracted

Path

C:\y42x39-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension y42x39. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/A7D031C38933EE26 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/A7D031C38933EE26 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: b/iDb8yD3CPLliS7y3FLz5VUvNtGlYe12NZWEqvr4p14KxjVGWJ6JtwrbME84S4m /aeRkBMfZfQgto0IXbtpG7bpuoIX33F5407oTRCRXMmwUUFlH3o4/GpShV+5w5/0 hINEZ3/2op4bOiiKxmmkq0PRLghbNWyk20My12Tqf59GIDoYUiXIyAnFVEo1mkQa sfcyvhM/jDWW8swyh1RbxGpLM2cw3g5bYu6GhRfRg3ZFEWk9VSb85JGdMvpM4OLi 0iq4llJ8ik+I0+wlaDauRS8m0U3d89Q+c1qr7+/ZEAbC18iZO1OSSuEPnmHQMWwz l92NSimRn+ZsJckOhwcu5VGsdk/3Pi5D2ZqUocQg959tNtQ3WNr3+RfXPSs6HQu+ JswFnenjdtQQEYvcy5YvqUxPCRFmQ8yaeDdIl6MPzDnQzaGIZ4XAX8bJo1ZrV57u ca6U3hXNcyI/KA5Us5eiseKI6qTbKdlV5afePyoZlDiQwkr8+HyuRSNS3+ui6Tj8 U4CC8UCoaDYXyf1jFBTyfCBxwfJ4fWTNiuMKSlkJcLDPGbv3bn0j9SUhWHSd65Me eI5b0A5LTfPmo7zl8Uh3u84W1E2JQZ27R/Ett5C8kFtcM1RVGWxSqyc4g3tiI4+r f3qQj3ZzInhvKEOuu5LvaHUXSXWL3eM2yPbgCismHVEq1lemg62H5ThZ5c6ztijc 5/21gHHjx3seAMlJL2+U87HLM++B+/Fdbm6W3EZCZTWksXGCuN8Hhi3hO5K/Oss8 HjHsuz8DuoeJaUJdzCsvgFCQrFEMxRfcBABwqDGKJ0z0Msvws/+yMmiCgwIzh2sl cpZPXbekU+YDWj+FKctgq0n7PMJO9Mix0iGsy615TrGgKyASmfjLx+TF41/fJtNw CbnbEczV38FhhvZbgsdH81Fkr1L9cez/+do9dE6N4GrWbx6txDwdsckdh8ID8q0C lCow2+dJMS0rTcwmJtxEa4nPhZcRGTNLcuGzBrCowwiHitoyi8vpLHwMh0s9nHFo aMA0tJYvqIkzyTCZLkBb1gNvoV3n6zIGeC8cqSIEDlUqXgqzSsZbq+ifn25h/z/p fzhTHVAXmsJ6v/GoagUC1LIzoN0xiaG6UdMv01+y62H0XiVfGHMIjeEc+OMU+vU5 UQdYiRinucFahrHKPEP54jmduuoTvdVOnBVvqoCBrtuHIr5I724PErxMim6p7/rX HsLb0zuDRIA8eGbwfdeEXnUaKd/6mpu/Udxw7IKJ/B73Gn8Qb6yxYKmR/lFtrl1K FOuCfZGJueQVAIqfgdL0lw== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/A7D031C38933EE26

http://decryptor.cc/A7D031C38933EE26

Targets

    • Target

      sodi_1

    • Size

      696KB

    • MD5

      8445dfa4a84b7045a93cacfd54bbbc90

    • SHA1

      8b2ed1cac7b5cb0b71ef0fc7b4102ea07368e667

    • SHA256

      9c8047488afe121552ac8acd0594d1c677e10373ee1b49582d17dc96161f7feb

    • SHA512

      a791387940729acd0adef7300c93529a16492e0c3fe09f23c03301c7df70f3debf3fe44252bf0da591956492e632b137fdd54bb4afabb37f8f06aca132c81f14

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Impact

Defacement

1
T1491

Tasks