General

  • Target

    6ebf347c7866b9d347642585a5171930c0ce06f5f32654fa1b84876d74f82e4d

  • Size

    120KB

  • Sample

    210414-sxvyad1682

  • MD5

    18e958c8975f67d02d3e6e4a269c2e08

  • SHA1

    f03b3b2777ce07fd68b7d242c7355c93748f86af

  • SHA256

    6ebf347c7866b9d347642585a5171930c0ce06f5f32654fa1b84876d74f82e4d

  • SHA512

    3c74d8d13611565d9334cd80ebb3f010606edb30df17f1a052469e14b3df915dddc28bb9c1d99984cd2a610650e8dd7e4cb77f85f7730a833d2f8ed5cdadbdbf

Malware Config

Extracted

Family

sodinokibi

Botnet

$2a$12$Ho8cE6Ms8MnqyuojNyvtfO37It9yISi28vxCKmfV8f96Xw5qN9.cy

Campaign

7405

C2

stemplusacademy.com

kunze-immobilien.de

renergysolution.com

tstaffing.nl

pivoineetc.fr

extraordinaryoutdoors.com

freie-baugutachterpraxis.de

friendsandbrgrs.com

lebellevue.fr

kissit.ca

pv-design.de

hardinggroup.com

stoeferlehalle.de

fibrofolliculoma.info

gantungankunciakrilikbandung.com

tinkoff-mobayl.ru

bouquet-de-roses.com

101gowrie.com

boulderwelt-muenchen-west.de

fax-payday-loans.com

Attributes
  • net

    true

  • pid

    $2a$12$Ho8cE6Ms8MnqyuojNyvtfO37It9yISi28vxCKmfV8f96Xw5qN9.cy

  • prc

    mspub

    encsvc

    winword

    wordpad

    ocomm

    infopath

    tbirdconfig

    ocssd

    dbsnmp

    agntsvc

    excel

    dbeng50

    firefox

    sql

    synctime

    onenote

    sqbcoreservice

    powerpnt

    mydesktopservice

    steam

    outlook

    xfssvccon

    ocautoupds

    thunderbird

    isqlplussvc

    oracle

    msaccess

    visio

    mydesktopqos

    thebat

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    7405

  • svc

    veeam

    svc$

    sophos

    memtas

    backup

    sql

    vss

    mepocs

Extracted

Path

C:\9438anusxz-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 9438anusxz. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/E6307FCD73386587 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/E6307FCD73386587 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: YN0384rOjV/1WtS/eZCAvAq3KXM3dqWSXGi69EQyhtFAY0LqcK0mDIpIgC2er6Oc xZ/qwZfvK7z+ikI2Yvo/33ShYyNplVYLVUyEdpqwodsqnSFBjO5HUTQprT7EfGrp tATrOtk9RsyHzQ2PsC2KQN+ofPSpvs63QHjtgWYpHxM5+U1doe4+KUQ9lQzN2sCg HceZdAH+qS2qnh0OPqu+2TYld1vzoE519Er51Xh7UYHBg2kuftLk8j4PTaUXXqh4 QxP+ltZ8UjxmOAOHvPjEyu3/ME0vMhvZFQnI7QFVWK4r3fR14c4idwYFZ9N0bWFA z9COLT0qjz1aIcEfIcXggDXrZvEZOmE6sXoTPs9fWY5iRDXb3aUja8Q369wwjq/w 1W+t7L0k2Zg22ywzaNjVgTxWbxSektnOdBwHqLlBtfq7W5QmR9cRGZDUfvcoQ3iG 8a9BO6fgYWyJDk0skKDF1X9RIOXhUyRq/l+6G5/iZkNQSUstM39keXHOKDwZUU5L WwGQmXMk1zk8ZYcGsIFJL/r+fVdNYXpXU/pbQblXx4IuL6Wlxcqa5t5R81AOG2Z4 dX+SHrKovsCFM9Wdl9AH0qmiNbWAmhgKiISYABG+FhJkRvhOfBSu/yp5SMzmSDOd 5CnL54Cewo6Eb9JCroaSC6mzE2+p1y8neIWk2ORmA4+MPlYj4T9lwEyIbrQzZE5u q1r4hjgfC5vZ2ZhDGWd9h8nutMFp9uoejjldJPpPboO2SCOqTLs4r/n+ezcg71NF D2p6ArVYYkQehUOaK6lF329WO+AhKWcKwn3Wt+kQvn/Fh2zggpN2MiajO9t+K/JE 0sgZTxtSpl8DIi+C7FJ60cqSVU50XrTlcH/v3QolOZr4z6B0iLK32e9/mUgssM5U 8Bg3xcsNKbqPQCyBtMl72aCarxCgapZgGSsxD3tGTV08IyWMyJijt8cAHhfTny/J qh7clBRYF8tpjVi46pHXLHuq4TKhDg7uMbFJ/ZHrm2iNLogMP2oRfUT5JQnQIuvf N/ZudEdo+x9uXWFlqr8gpNAeI+50tAVB4GjH83SM5E8fbZl6Gbe5lHNVrx9NjNzF j447ZT1zGITHD/RFbyy3DwZSQQ7XuA/workPV96yFbvwqlCr9znRkM4O000pASj9 tK1T+xrqYdjIYC2fYxE6IgB92+8fk6vNTrDQ7EzvEY6leNmnkx+xNDODoGlpj+DO SDg4AIs/avHmAb7semFAHbHMRm4sYq4/DE85zf4XVIJpCITu8f4lc2xA5KS1hk7B UpJe2uNtTiiyDy8zPZg= ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/E6307FCD73386587

http://decoder.re/E6307FCD73386587

Targets

    • Target

      6ebf347c7866b9d347642585a5171930c0ce06f5f32654fa1b84876d74f82e4d

    • Size

      120KB

    • MD5

      18e958c8975f67d02d3e6e4a269c2e08

    • SHA1

      f03b3b2777ce07fd68b7d242c7355c93748f86af

    • SHA256

      6ebf347c7866b9d347642585a5171930c0ce06f5f32654fa1b84876d74f82e4d

    • SHA512

      3c74d8d13611565d9334cd80ebb3f010606edb30df17f1a052469e14b3df915dddc28bb9c1d99984cd2a610650e8dd7e4cb77f85f7730a833d2f8ed5cdadbdbf

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Impact

Defacement

1
T1491

Tasks