Errors

Reason
config extraction: sodinokibi: invalid character '\x0e' after top-level value

General

  • Target

    e80810241a2c6991cd3cfc807a62c1392eeed146fc60cb30326a8e3bc6bc284e.zip

  • Size

    248KB

  • MD5

    310a72f8e3f3a3d32f0a9d22e2c64478

  • SHA1

    c0faceb6de38aebff72cc18d05088529b01ac036

  • SHA256

    4996a2b9566ae0c478842f2a37af9478c031a63ca8a2697cc5a60ce83ee5c7fd

  • SHA512

    5ec05cc24b3670eee8a67ae0211325925bfe642e75d8c198ce787ba11f0fd47b136ee36abb7baabfd5ff3fd09f328299b6f924868fc87daa2b86626c0528ed38

Malware Config

Extracted

Family

sodinokibi

Botnet

$2a$10$AsrcJboraJQ9XI3PyPzZduhG0r8hqpL3vGTX6b0.rcTRQni66weGS

Campaign

1556

C2

rosavalamedahr.com

levihotelspa.fi

journeybacktolife.com

faronics.com

edgewoodestates.org

no-plans.com

tampaallen.com

kath-kirche-gera.de

vermoote.de

ampisolabergeggi.it

trackyourconstruction.com

fizzl.ru

biapi-coaching.fr

nosuchthingasgovernment.com

loprus.pl

baptisttabernacle.com

mank.de

croftprecision.co.uk

judithjansen.com

sobreholanda.com

Attributes
  • net

    true

  • pid

    $2a$10$AsrcJboraJQ9XI3PyPzZduhG0r8hqpL3vGTX6b0.rcTRQni66weGS

  • prc

    agntsvc

    xfssvccon

    sqlbrowser

    mysqld_opt

    visio

    steam

    mysqld

    powerpnt

    excel

    oracle

    encsvc

    isqlplussvc

    sqlagent

    mydesktopqos

    ocssd

    firefoxconfig

    dbsnmp

    wordpad

    msftesql

    tbirdconfig

    ocomm

    mysqld_nt

    onenote

    infopath

    thebat

    thunderbird

    thebat64

    msaccess

    sqlservr

    sqbcoreservice

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} Extension name: {EXT} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    1556

  • svc

    sql

    sophos

    memtas

    vss

    mepocs

    backup

    svc$

    veeam

Signatures

Files

  • e80810241a2c6991cd3cfc807a62c1392eeed146fc60cb30326a8e3bc6bc284e.zip
    .zip

    Password: infected

  • e80810241a2c6991cd3cfc807a62c1392eeed146fc60cb30326a8e3bc6bc284e
    .dll windows x86


  • e80810241a2c6991cd3cfc807a62c1392eeed146fc60cb30326a8e3bc6bc284e_dump7_0x00730000
    .dll windows x86