General

  • Target

    0a471df64b677fd6608c72626444d22381f7fc20ea0165cc5b88fdad0402d32f.bin.sample

  • Size

    182KB

  • Sample

    210503-6emtgg3p7j

  • MD5

    329b796513db794d0548843d5e919a1e

  • SHA1

    7979369952d9ed389bbbc598a3899db552994a1f

  • SHA256

    0a471df64b677fd6608c72626444d22381f7fc20ea0165cc5b88fdad0402d32f

  • SHA512

    fbc1b279712ed01758ae346bf9119e3d81dd705530d664f3888a811febf6a7833183aece36cdb2b3384bb24a59eaabce129649ee866ddf812ba9caaa57ef45e0

Malware Config

Extracted

Family

sodinokibi

Botnet

$2a$10$x/6aySeLf1ahONBS192NfutOGjKqJxW02UpOPK14CAPB1uSmtADxe

Campaign

3451

C2

fibrofolliculoma.info

simpkinsedwards.co.uk

precisionbevel.com

yamalevents.com

ogdenvision.com

epwritescom.wordpress.com

ianaswanson.com

nhadatcanho247.com

kariokids.com

montrium.com

longislandelderlaw.com

ouryoungminds.wordpress.com

levihotelspa.fi

lapmangfpt.info.vn

parks-nuernberg.de

siluet-decor.ru

baustb.de

sw1m.ru

radaradvies.nl

sanaia.com

Attributes
  • net

    true

  • pid

    $2a$10$x/6aySeLf1ahONBS192NfutOGjKqJxW02UpOPK14CAPB1uSmtADxe

  • prc

    oracle

    powerpnt

    tbirdconfig

    winword

    sqbcoreservice

    onenote

    msaccess

    excel

    ocomm

    synctime

    thunderbird

    steam

    wordpad

    dbeng50

    agntsvc

    isqlplussvc

    outlook

    dbsnmp

    xfssvccon

    mspub

    sql

    firefox

    ocautoupds

    visio

    thebat

    encsvc

    mydesktopqos

    infopath

    ocssd

    mydesktopservice

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    3451

  • svc

    veeam

    mepocs

    backup

    sql

    memtas

    vss

    svc$

    sophos

Extracted

Path

C:\7x2hq0x-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 7x2hq0x. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/64F9D9A943E5E574 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/64F9D9A943E5E574 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: xch6e7MwVAjI7pB8V0+fOnKws8xu/b7uFYFeFjThHch7zHng6TyrxqAZCNkXYCVm XbiRca0N4CYatvkyrrEq3wm1gvfxvv6ESmGphcRVpMqeC+ccVZt2P16FzcmuA8Jc 6djUDaQevgl1VbJwksWJKW9efdNLEs83L7S0RMZY88Y9Bb5rwA4jUEbgMDxftelr C1yLWvxDo4Sg50LMP3Cd0IH1iEV2l1q9GcW4bxahyVqnmJZ1/J5Xf+oxbheFVWV+ 1ZL5tPVev1n3GGWQlB3ISekSCWe1vWXnknckgknovLISGjSrvFaX/MoCU934QLed y6M5vA0TCZThcSXIsqZuxUTybgUKwBn7TGxW0GFJ/CwvSIbN4bb5e73Z65z09ZeH hyyKH9HRG/Y5dV6oSXwdSOb7AcH2U/EEYxLpoAP9HkbH5tpfQNCA9wC8mIOyXyfK LX3AYoVxt580icV+YYPS3P0XpdLxLkrWNh/3A3pFc5AkOyO7HlwpCUvPB/uN1mEB KcLjLaXVtyJt5GPJNmphNSywcW6W9xsgC2dJL1hvuhNoPEsDTGJGYDAlnocdMjb0 A/V7UsquN1Yis8Sws5yIvwcz+oks6QulPHIVnTopJJXhcMtYYw0EGmaG85vTqgZh v6yUI5oZ5pfIpavg1nPqIQKV3tIAUMzvcprTbqNUqp8xn8TGHozKuj7ezeIWzaYe zXiDSdOCddqEYpZ/e+H5D6EIRV9sf2o3KQ2Muhb4afY2rR0HlKHki2LHuLLt8eVY 1ucu2lupM0Uo4xZEOQjNwEdI8ZyT8INgw7tVcO3F2KCTkMQkLJ1yW3B/I6AlVE3x AyGz6NUxMVp59juTUiacH/NjBLZ0tbZrOTQQ4BQ1h8QHDCEG3Je89vvveOHUDtHP ez93kfm/S1xp1uDmU9PLsGFovDGMO1Lenpe4LLmiZmqkZRgPjWGF20sDm9IrzjaQ QjLnmcMwSz1L8tpTOU8N/hL+ozf9q0RBae4aM+Rtqsj5CNEynSJ7SPl+blkUlWXv P2qVAOzBJzQ0+GvrqMdCFALU5uzI+axzutdXYhpeuo4jNzJXCV3oZ6A098DYBwqO asFrZJVwI832826f/KQTxzeBxmOOkafNZByPZY+cax2FMYOp+/W733lTUz81ktpV XXFNSltDGfnjSWMx/BkYowXX9lkoLC+koT1Ejo7R17TugkLJsiWp9w3mawLn66Vs S7sqmKIvfhfla9b6tA0LJn6R0PFNY79N/MA5KupupYmVO3ajIx1FRx9ACZiHMkwP tSbvogE9ZS4mMYyVhitd1MGE ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/64F9D9A943E5E574

http://decryptor.cc/64F9D9A943E5E574

Targets

    • Target

      0a471df64b677fd6608c72626444d22381f7fc20ea0165cc5b88fdad0402d32f.bin.sample

    • Size

      182KB

    • MD5

      329b796513db794d0548843d5e919a1e

    • SHA1

      7979369952d9ed389bbbc598a3899db552994a1f

    • SHA256

      0a471df64b677fd6608c72626444d22381f7fc20ea0165cc5b88fdad0402d32f

    • SHA512

      fbc1b279712ed01758ae346bf9119e3d81dd705530d664f3888a811febf6a7833183aece36cdb2b3384bb24a59eaabce129649ee866ddf812ba9caaa57ef45e0

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks