Resubmissions

11-08-2024 04:29

240811-e4cpqavfmp 10

11-08-2024 02:35

240811-c2187avfqa 10

18-02-2021 14:36

210218-e988k496be 10

General

  • Target

    2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.bin

  • Size

    118KB

  • Sample

    210218-e988k496be

  • MD5

    9c08dfc58885a9a7beca989ea5ee9108

  • SHA1

    ce2f51348da7a19dbf0e79b64f9eb8e46f45efa3

  • SHA256

    2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e

  • SHA512

    34cf39e4976f264f31b3236cca87aeca04ebc447fe99b35bbb72dd126462eed78310954fcdebab48b1f3ad9eaf5efe22ad8405b12d80ddd357244138067a1ae2

Malware Config

Extracted

Family

sodinokibi

Botnet

$2a$10$n1J5.fM58bdQxg1IiAWkk.PuUeYhAcGlSCgxM6CJQ94aF.GiJ58eG

Campaign

6758

C2

mezhdu-delom.ru

songunceliptv.com

basisschooldezonnewijzer.nl

justinvieira.com

iqbalscientific.com

memaag.com

cwsitservices.co.uk

paymybill.guru

mir-na-iznanku.com

anteniti.com

slupetzky.at

delchacay.com.ar

calxplus.eu

jolly-events.com

irishmachineryauctions.com

solerluethi-allart.ch

schmalhorst.de

maasreusel.nl

sanyue119.com

lescomtesdemean.be

Attributes
  • net

    true

  • pid

    $2a$10$n1J5.fM58bdQxg1IiAWkk.PuUeYhAcGlSCgxM6CJQ94aF.GiJ58eG

  • prc

    tbirdconfig

    firefox

    outlook

    encsvc

    sql

    xfssvccon

    wordpad

    visio

    thunderbird

    infopath

    thebat

    msaccess

    dbsnmp

    ocssd

    ocautoupds

    excel

    isqlplussvc

    agntsvc

    ocomm

    oracle

    steam

    powerpnt

    onenote

    synctime

    sqbcoreservice

    mspub

    dbeng50

    mydesktopservice

    mydesktopqos

    winword

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] Data leak [+] First of all we have uploaded more then 300 GB archived data from \\UDATA. Example of data: - Accounting - Finance - Personal Data - Banking data - Strategic sourcing - Management - Projects, plans - Immigrants info - Confidential files And more other... Our blog: http://dnpscnbaix6nkwvystl3yxglz7nteicqrou3t75tpcc5532cztc46qyd.onion/ Read what happens to those who do not pay. We are ready: - To provide you the evidence of stolen data - To give you universal decrypting tool for all encrypted files. - To delete all the stolen data. [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    6758

  • svc

    mepocs

    vss

    sql

    memtas

    sophos

    backup

    svc$

    veeam

Extracted

Path

C:\fx2721bff-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension fx2721bff. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] Data leak [+] First of all we have uploaded more then 300 GB archived data from \\UDATA. Example of data: - Accounting - Finance - Personal Data - Banking data - Strategic sourcing - Management - Projects, plans - Immigrants info - Confidential files And more other... Our blog: http://dnpscnbaix6nkwvystl3yxglz7nteicqrou3t75tpcc5532cztc46qyd.onion/ Read what happens to those who do not pay. We are ready: - To provide you the evidence of stolen data - To give you universal decrypting tool for all encrypted files. - To delete all the stolen data. [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/250294D53AEAEDEC 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/250294D53AEAEDEC Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: WHHZodc4m9rMYK49zFf8wX3IxDFb7cFIUavq410ZFDVLIz1i2Pw6EJmIwG7c5NG6 Gb9+8O8yZa/rdo/EwM7/PSzA6sAuiM8Gk7e7OORu6B/CC1mROejX1PaV2WQ+w2lC vEtrWZ2RsT+9vR9XNUYS9l/snGnKLmXb2SW9PGeITDwXNENFrHrsXgIU6Ky4Rcse mKMMy0YEWh3wHiaqupr5Ye5sWqcSJke29tw1l15T9i0BJzmt60ZMm2tJzAANC8zI 7h6PqqB4MCf7QQjXGxeap9fs32uJP5Tfc93hlYW2QLaY8VsDVI+PO5NsWikxnfUW s3I5OBZbJ9IUEZYcCoI1EXIURV3p3gdpQGe0sfDC20U01adHhoHBHWsH+St50R5a RxmGxyfM15Nucigx86WR5+7kpFceyA0Xb4R9pjZfj5uaWRCMw0mXlkiv2bbnbXBA ZbYivgVmckTcGpJn0w4gaj6stLLT5981/zglMM6CQs+H6CZr8uBCN2630+cog3/g NlC1abFgvMFTZ7g0Y4rpu/nTm9dH2yUQ32aZq03/V8Kows4nRISHKf1mxygGw/tL m42yfUEjplGIhpHmliJlqpL3E/hTwIbwU6Dv1xH4+yTv0wwcx7kH4+HdXTIdjEJV 5KuvOtldTzxsVuF2GPF24/ZRU6XZWd+u7Pn7io/Gj6Q3JJG2X06wmxA6GAKK1LL2 RaX4C+xDW1zQ6HRs70U3cvLri2szh7FvwsBig/SfJFQcnkUE31UfALoActzHwH0T ToTumh2ZKgigc/fRbzqK8lhSIsfExg6mFoWqgRpZerE3qQsIw+RlmO3WjlQSaFkm DK+GOXToIu3Wu14uoEQX/Tzz1mrjpib2ILrkgA1bNgHGRC3eiU0doL9Q8a48ivrd uuLIBiIH0eLT4rrBqets4xjlxcyYTD0xSCoNp1ot/NtakFUhO12x1KM6z62cdc+B +Mb5Tj1ABczuCfMW1ZSe+4tcA2EDPD2zAz6HahRBUB6p9AdwJllx759PLi5uho6r WjAhnzSegDFM0B/+RCQOSmHyUaGH3LLWi9Ne3jfTkF6MmNBJmKYVbGKcjwP7sF+J MM9SOFxeT1OStzOHgRDui+/nUhf/iwycBhg3Lo5cgUml2sdvZP2OQV3oJxiJrC0E F2/0IJ5Rr3yWXD+a/g77bME9ciRWKrY9uFNhvuPwfgghUOOWW7WYexJBiotKAZr/ rkv1XXWjFIISSLtxZy5qIObFEs8XrpIJqqoIURs0+EGbttM3m1zRlCEfYIFFEcE0 TH64OwB6BlCCPx71yctes4MhpkvqQg== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

Targets

    • Target

      2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.bin

    • Size

      118KB

    • MD5

      9c08dfc58885a9a7beca989ea5ee9108

    • SHA1

      ce2f51348da7a19dbf0e79b64f9eb8e46f45efa3

    • SHA256

      2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e

    • SHA512

      34cf39e4976f264f31b3236cca87aeca04ebc447fe99b35bbb72dd126462eed78310954fcdebab48b1f3ad9eaf5efe22ad8405b12d80ddd357244138067a1ae2

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks