General

  • Target

    enc.exe

  • Size

    121KB

  • Sample

    210402-c3lgzz3qps

  • MD5

    6f0b92488eae3ccefc0db7a6b0d652ee

  • SHA1

    45adc4224d2ae9fd75b19417ca6913515c5222ee

  • SHA256

    457936c28938616495836c472b3389a0870574bee6a5dc026d5bd14979c6202c

  • SHA512

    14bc82aa8f60eed63725e0da0f51321c5eeefd680887ac76d47f3b6b023b00aa8e40ae7c147e3b6e26e7592ae3db37513d518be20c69dc575fd7e48b06a656bc

Malware Config

Extracted

Family

sodinokibi

Botnet

$2b$13$66xegcZsMxsBw2BDLmkQTu2oUSx.IYeFvQVIyRMfC99PEuhL1zjlC

Campaign

10

C2

Attributes
  • net

    false

  • pid

    $2b$13$66xegcZsMxsBw2BDLmkQTu2oUSx.IYeFvQVIyRMfC99PEuhL1zjlC

  • prc

    vsnapvss

    EnterpriseClient

    firefox

    infopath

    cvd

    tv_x64.exe

    VeeamTransportSvc

    steam

    encsvc

    mydesktopservice

    outlook

    synctime

    ocssd

    SAP

    cvfwd

    bengien

    vxmon

    bedbh

    ocomm

    ocautoupds

    raw_agent_svc

    oracle

    disk+work

    powerpnt

    saposcol

    sqbcoreservice

    sapstartsrv

    beserver

    saphostexec

    dbeng50

    isqlplussvc

    CVODS

    DellSystemDetect

    CVMountd

    TeamViewer.exe

    dbsnmp

    thunderbird

    mspub

    wordpad

    visio

    benetns

    QBCFMonitorService

    TeamViewer_Service.exe

    tv_w32.exe

    QBIDPService

    winword

    thebat

    VeeamDeploymentSvc

    avagent

    QBDBMgrN

    mydesktopqos

    xfssvccon

    sql

    tbirdconfig

    CagService

    pvlsvr

    avscc

    VeeamNFSSvc

    onenote

    excel

    msaccess

    agntsvc

  • ransom_oneliner

    Follow {EXT}-README.txt instructions

  • ransom_template

    === Welcome to DarkSide === [+] What's Happened? [+] Your files have been encrypted and currently unavailable. You can check it. All files in your system have {EXT} extension. By the way, everything is possible to recover (restore) but you should follow our instructions. Otherwise you can NEVER return your data. [+] What are our guarantees? [+] It's just a business and we care only about getting benefits. If we don't meet our obligations, nobody will deal with us. It doesn't hold our interest. So you can check the ability to restore your files. For this purpose you should visit our website where you can decrypt one file for free. That is our guarantee. It doesn't metter for us whether you cooperate with us or not. But if you don't, you'll lose your time and data cause only we have the private key to decrypt your files. In practice - time is much more valuable than money. [+] How to get access to our website? [+] Use TOR browser: 1. Download and install TOR browser from this site: https://torproject.org/ 2. Visit our website: http://l55ysq5qjpin2vq23ul3gc3h62vp4wvenl7ov6fcn65vir7kc7gb5fyd.onion When you visit our website, put the following data into the input form: Key: {KEY} !!! DANGER !!! DON'T try to change files by yourself, DON'T use any third party software or antivirus solutions to restore your data - it may entail the private key damage and as a result all your data loss! !!! !!! !!! ONE MORE TIME: It's in your best interests to get your files back. From our side we (the best specialists in this sphere) ready to make everything for restoring but please do not interfere. !!! !!! !!

  • sub

    10

  • svc

    QBCFMonitorService

    thebat

    dbeng50

    winword

    dbsnmp

    VeeamTransportSvc

    disk+work

    TeamViewer_Service.exe

    firefox

    QBIDPService

    steam

    onenote

    CVMountd

    cvd

    VeeamDeploymentSvc

    VeeamNFSSvc

    bedbh

    mydesktopqos

    avscc

    infopath

    cvfwd

    excel

    beserver

    powerpnt

    mspub

    synctime

    QBDBMgrN

    tv_w32.exe

    EnterpriseClient

    msaccess

    ocssd

    mydesktopservice

    sqbcoreservice

    CVODS

    DellSystemDetect

    oracle

    ocautoupds

    wordpad

    visio

    SAP

    bengien

    TeamViewer.exe

    agntsvc

    CagService

    avagent

    ocomm

    outlook

    saposcol

    xfssvccon

    isqlplussvc

    pvlsvr

    sql

    tbirdconfig

    vxmon

    benetns

    tv_x64.exe

    encsvc

    sapstartsrv

    vsnapvss

    raw_agent_svc

    thunderbird

    saphostexec

Extracted

Path

C:\au83w-README.txt

Ransom Note
=== Welcome to DarkSide === [+] What's Happened? [+] Your files have been encrypted and currently unavailable. You can check it. All files in your system have au83w extension. By the way, everything is possible to recover (restore) but you should follow our instructions. Otherwise you can NEVER return your data. [+] What are our guarantees? [+] It's just a business and we care only about getting benefits. If we don't meet our obligations, nobody will deal with us. It doesn't hold our interest. So you can check the ability to restore your files. For this purpose you should visit our website where you can decrypt one file for free. That is our guarantee. It doesn't metter for us whether you cooperate with us or not. But if you don't, you'll lose your time and data cause only we have the private key to decrypt your files. In practice - time is much more valuable than money. [+] How to get access to our website? [+] Use TOR browser: 1. Download and install TOR browser from this site: https://torproject.org/ 2. Visit our website: http://l55ysq5qjpin2vq23ul3gc3h62vp4wvenl7ov6fcn65vir7kc7gb5fyd.onion When you visit our website, put the following data into the input form: Key: qgwykfZE2HQ7oy7ug0CaNh9SBxzFvX4cOS2n1v47M6QEa50iHSN9htxU2mfNjo68 omZ9LxUbyiwluH6lwTSgVs15Y+LfUy2TDNnmdUC97L0WlV9wJItZ59lY/xZYQrga ghTfe5u7GBoGiAKAi9yqSoHGiMdzGdOHPkShY5Qhs2h4AXRJUO+mkMlMdh4Ks0qv z6JCeJGpFX5z2/2kztHL+PRhEPPWD+4h+iVfsIsc37H4PH/GYunPvl5YhJmk70er 8eu41cpF/c4KoCZaflQpho+6td+BPTn30kcs4bQZPK1OoZf1tvpQOrWnYO+09RfI 1crQaMKRjZ3X4K2ENjUNk7pXVsOO+awIzZ/LcNTpv4/NX4y+ZriypD8c2Z2weheO xucrbDfuARElHSd7dHhlhTi3J4YoC0rzYNXK2HRjofnTzQ6XJ38A3m5E/FGQu4Wz FseyHHs4NeU3ncmf+QvMU9RlyEtyZnUp8sK6kfDIZjRCNQPQbESZaj3Rwxr59DCF BibL1CoBYUn3zyEEw2pb/6c/jHr4QCmDI8xL0fIGBo5vnSsaiaY9LDE6rGpgGt/q e2fG6BkaW6mD/33wywesQC8Ldt5Pd097rrbBJX28JOL3KfDxhUL0ReBIXX4HWYee H6cOBtTIZKVR6ugC7eG7LEuy4lrwKDIeP5WLiKfVRVqfmjjlFXli9soxsoAKimdS jP9dSYYNvWr1dKIKcHJxhACnJjMJgJ0B+4nABoJXQopmGHQEchewOWf0xlyWcvPm /B8f8nlNaEn6NZbQlkBpKt7W/oBTbRAsqk+C5sGSWfxH4vqRAb8JrqCSSMDCNoPB jFN3qxwaDjUA2NJQaprKKIhmjuMuA2pN6LpKSRUmnthvka/7QQ4Fu1jL71hfavhs ykBNKLBrkmAtD9MXsr4c2ynuV9C7rkL/6kGY0Ohq8eNq5QF4OQfmwSjDeAHeQS+3 S0EpYNignQqHgujfut/9yvGpVpgj5EpTTOfVNt2Abg5KPzhPlbHyqIP020OtqwI1 mb3XpCmo0ahsfSwlNZ6v4DJF+CclMaH/s6lqINsFHVlEHiLkRMAPI7jxpCL09mIy ywneJVd7gn/9AK8pDp778Mgt0kvCVkf3Oa5STWy+Hel/trsgX+Qea358bVejliCe XiQG0yPiDsnf85HOofN5l32hwMgWk4+iHQB6a0X2xqNeUb+dvUzm6hmbvja3+e7S aA6IPoFr2FPU489EBjsT4qfZDuTt89qpaX/y1KpukZ688pPMuAlZQQp7wPSqcunq PFcCREBXSlDiog== !!! DANGER !!! DON'T try to change files by yourself, DON'T use any third party software or antivirus solutions to restore your data - it may entail the private key damage and as a result all your data loss! !!! !!! !!! ONE MORE TIME: It's in your best interests to get your files back. From our side we (the best specialists in this sphere) ready to make everything for restoring but please do not interfere. !!! !!! !!
URLs

http://l55ysq5qjpin2vq23ul3gc3h62vp4wvenl7ov6fcn65vir7kc7gb5fyd.onion

Targets

    • Target

      enc.exe

    • Size

      121KB

    • MD5

      6f0b92488eae3ccefc0db7a6b0d652ee

    • SHA1

      45adc4224d2ae9fd75b19417ca6913515c5222ee

    • SHA256

      457936c28938616495836c472b3389a0870574bee6a5dc026d5bd14979c6202c

    • SHA512

      14bc82aa8f60eed63725e0da0f51321c5eeefd680887ac76d47f3b6b023b00aa8e40ae7c147e3b6e26e7592ae3db37513d518be20c69dc575fd7e48b06a656bc

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Impact

Defacement

1
T1491

Tasks