General

  • Target

    6c5ddbe058da35b2731fe10234520a6bb78604f860ed4188a1bd07e62fe4ec11.bin.sample

  • Size

    116KB

  • Sample

    210503-e3j1beclns

  • MD5

    c647b2da83ef8e1a790d1e0e25898780

  • SHA1

    02871c02e581ad345f1c438b6c8c730cf2d2f534

  • SHA256

    6c5ddbe058da35b2731fe10234520a6bb78604f860ed4188a1bd07e62fe4ec11

  • SHA512

    f169ebc4ffbb3d0cf8f526e0cde89706b4521086ccb0f7653cd881b595aae2727891e8ea3eb6bace263d704b0ef9a0151094c03b7c1800cb5d4e54eaaf3453e7

Malware Config

Extracted

Family

sodinokibi

Botnet

$2a$10$gMHdtu094GE7DD46JvCH6.bPoHnpKjInjjdxBtPaRwAEY6gOWGKYG

Campaign

3721

C2

quemargrasa.net

wraithco.com

dubnew.com

zweerscreatives.nl

eaglemeetstiger.de

highimpactoutdoors.net

vesinhnha.com.vn

rocketccw.com

div-vertriebsforschung.de

rieed.de

ulyssemarketing.com

jbbjw.com

moveonnews.com

em-gmbh.ch

deepsouthclothingcompany.com

2ekeus.nl

vdberg-autoimport.nl

deschl.net

teknoz.net

micahkoleoso.de

Attributes
  • net

    true

  • pid

    $2a$10$gMHdtu094GE7DD46JvCH6.bPoHnpKjInjjdxBtPaRwAEY6gOWGKYG

  • prc

    firefox

    agntsvc

    tbirdconfig

    ocomm

    visio

    oracle

    outlook

    winword

    isqlplussvc

    mydesktopservice

    steam

    thunderbird

    ocautoupds

    synctime

    infopath

    thebat

    onenote

    excel

    encsvc

    mspub

    dbeng50

    sql

    sqbcoreservice

    xfssvccon

    msaccess

    powerpnt

    ocssd

    wordpad

    dbsnmp

    mydesktopqos

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    3721

  • svc

    vss

    veeam

    sophos

    mepocs

    svc$

    backup

    sql

    memtas

Extracted

Path

C:\ftx3897i-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension ftx3897i. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/DE8113B7D511F72A 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/DE8113B7D511F72A Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: M+b3HgoYF2RMhzKg/CQ6Ki3FVemWudaFsWdqt3+bAt9UK0nP9kATVqpFCT1CzW8o +kDcxxYH/8yXbxxj7xZy2JsWOyT+QdCHsiKEuXt9bcVhIdX3dvLppA0Ad0UpSMVE 6BW134zqlCHJQMZ8SON8dOMZC/HMuSlEGc+7cILibaY3Poh0fGlg1kiOEd7W2shO 1YCX+jIINnWg3sHQWgQfKM7JrvcgeYa85HeTParGDIl7FucCw+4XAFAH+n8fgoif ZVTUe/DosltTyZVfexPWkFOTSs8W4arMEW7O/CLpVe21lfRS7O+ndFI1Wm90wWkH myqTpPyriabn7lK4rVrJkhp1CGUSc/wmfyQxQHuM6RAWqh2B6F4Zz+QmAIySoiU1 j194EGZsWCkPqL8elfEQhM99lliVU83iRGEzjHB9lnxB/mE2lRKYE8gmPTikn84g nLE6OO3ETEfDl+l6TQLH6xsLxVTCs5qs94QQEyawMFlqu1cnhF4NzpfHC77XaxDD ybCPbbq8SPCY/VMw6lGvTx4Xw3xrxxZuyynXv+sx0FYCteUaPxppEibLHCDaGfWW WMasqGTnUZ6MrCqFTtwVwVTB3bc9pARpa9eBATfrUe/7IyoG+N/az/GhJwLxobQW YEnBiTFjSOnPNagLPZ9V0UXJK6wvZWVcGXftNnYpQ4lH3CTPMVc8Lmq5//wsXu0o uoLxxw2ICcDpzhh/WGYegr5rYBR0Fe999bSIZ/PXVBC3OK/JnutK3t0zezXYzsKE AXSbp0vpIPjFsOXw+llXxdhveP8djZIUkl/Q/892ne1psdsHDV9xtAIimHBTWxeb YZq1R1KEpLeRUUc4ZCtuGUyw1cGWyRb++PqAPZs+qv5jH4jXBFcr2c6mQVMRc3g7 jHnwxHkFRnSMJRk+xwf04wtm0BSCAoa75NC3LGF1k7dv+4Zm7SzOZldQh6RhBHrq K1LWYY6PjJmUhdRSSpmhHi9rjvxogbl9qPFSBsISj8Mb2y2CuVPnTJG9h9P0XQMd K/z+2FcFrLJSr/SItNtC78Msv/Bg1mCQejonifGR9LVwcVDZSG/IL6XkaEXwV+1/ olMO/nRSoSUfeLHFlRT5UKrRbYa5jLJ4N7CWjaK4DCY/OAU2hfgW5h2E67R3wFPf CsO255HyP8Q7FYta1j0yW5qGSc/Trg5aMbi5Q90AMsMGLzN/L/3xtY9NTieT9E/t CS2tF5tt+/fclqHCWpytRK0qJimjQIUBulwTBPCHdeAnAAwYUGAmaS2jodIcwq4N GNl27DlOqAZ63/gMPjDvNyhLvZM= ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/DE8113B7D511F72A

http://decoder.re/DE8113B7D511F72A

Targets

    • Target

      6c5ddbe058da35b2731fe10234520a6bb78604f860ed4188a1bd07e62fe4ec11.bin.sample

    • Size

      116KB

    • MD5

      c647b2da83ef8e1a790d1e0e25898780

    • SHA1

      02871c02e581ad345f1c438b6c8c730cf2d2f534

    • SHA256

      6c5ddbe058da35b2731fe10234520a6bb78604f860ed4188a1bd07e62fe4ec11

    • SHA512

      f169ebc4ffbb3d0cf8f526e0cde89706b4521086ccb0f7653cd881b595aae2727891e8ea3eb6bace263d704b0ef9a0151094c03b7c1800cb5d4e54eaaf3453e7

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks