General

  • Target

    329983dc2a23bd951b24780947cb9a6ae3fb80d5ef546e8538dfd9459b176483

  • Size

    119KB

  • Sample

    210504-ecpzqtmj6s

  • MD5

    a4331ff805b0a8f2a2892777c224b65e

  • SHA1

    2c5521077dd1a6f5f3558351370880aee9ab7c71

  • SHA256

    329983dc2a23bd951b24780947cb9a6ae3fb80d5ef546e8538dfd9459b176483

  • SHA512

    786a6ffdd7206b0f11dd45921826e3685fe4b64b82b4fa26702a30dcb762d4310b3b55683a8c510175ed6a9086125156e676caa3220597f8ed7298f6cdc51799

Malware Config

Extracted

Family

sodinokibi

Botnet

$2b$13$wz1reRfdLg.aiStLDqg5JeqqySemSPatWKHdwbpWVrC3ty7Akscg6

Campaign

58

Attributes
  • net

    false

  • pid

    $2b$13$wz1reRfdLg.aiStLDqg5JeqqySemSPatWKHdwbpWVrC3ty7Akscg6

  • prc

    vsnapvss

    EnterpriseClient

    firefox

    infopath

    cvd

    tv_x64.exe

    VeeamTransportSvc

    steam

    encsvc

    mydesktopservice

    outlook

    synctime

    ocssd

    SAP

    cvfwd

    bengien

    vxmon

    bedbh

    ocomm

    ocautoupds

    raw_agent_svc

    oracle

    disk+work

    powerpnt

    saposcol

    sqbcoreservice

    sapstartsrv

    beserver

    saphostexec

    dbeng50

    isqlplussvc

    CVODS

    DellSystemDetect

    CVMountd

    TeamViewer.exe

    dbsnmp

    thunderbird

    mspub

    wordpad

    visio

    benetns

    QBCFMonitorService

    TeamViewer_Service.exe

    tv_w32.exe

    QBIDPService

    winword

    thebat

    VeeamDeploymentSvc

    avagent

    QBDBMgrN

    mydesktopqos

    xfssvccon

    sql

    tbirdconfig

    CagService

    pvlsvr

    avscc

    VeeamNFSSvc

    onenote

    excel

    msaccess

    agntsvc

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-README.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] What's Happened? [+] Your files have been encrypted and currently unavailable. You can check it. All files in your system have {EXT} extension. By the way, everything is possible to recover (restore) but you should follow our instructions. Otherwise you can NEVER return your data. [+] What are our guarantees? [+] It's just a business and we care only about getting benefits. If we don't meet our obligations, nobody will deal with us. It doesn't hold our interest. So you can check the ability to restore your files. For this purpose you should visit our website where you can decrypt one file for free. That is our guarantee. It doesn't metter for us whether you cooperate with us or not. But if you don't, you'll lose your time and data cause only we have the private key to decrypt your files. In practice - time is much more valuable than money. [+] How to get access to our website? [+] Use TOR browser: 1. Download and install TOR browser from this site: https://torproject.org/ 2. Visit our website: http://4to43yp4mng2gdc3jgnep5bt7lkhqvjqiritbv4x2ebj3qun7wz4y2id.onion When you visit our website, put the following data into the input form: Key: {KEY} !!! DANGER !!! DON'T try to change files by yourself, DON'T use any third party software or antivirus solutions to restore your data - it may entail the private key damage and as a result all your data loss! !!! !!! !!! ONE MORE TIME: It's in your best interests to get your files back. From our side we (the best specialists in this sphere) ready to make everything for restoring but please do not interfere. !!! !!! !!

  • sub

    58

  • svc

    QBCFMonitorService

    thebat

    dbeng50

    winword

    dbsnmp

    VeeamTransportSvc

    disk+work

    TeamViewer_Service.exe

    firefox

    QBIDPService

    steam

    onenote

    CVMountd

    cvd

    VeeamDeploymentSvc

    VeeamNFSSvc

    bedbh

    mydesktopqos

    avscc

    infopath

    cvfwd

    excel

    beserver

    powerpnt

    mspub

    synctime

    QBDBMgrN

    tv_w32.exe

    EnterpriseClient

    msaccess

    ocssd

    mydesktopservice

    sqbcoreservice

    CVODS

    DellSystemDetect

    oracle

    ocautoupds

    wordpad

    visio

    SAP

    bengien

    TeamViewer.exe

    agntsvc

    CagService

    avagent

    ocomm

    outlook

    saposcol

    xfssvccon

    isqlplussvc

    pvlsvr

    sql

    tbirdconfig

    vxmon

    benetns

    tv_x64.exe

    encsvc

    sapstartsrv

    vsnapvss

    raw_agent_svc

    thunderbird

    saphostexec

Extracted

Path

C:\o6s6f9-README.txt

Ransom Note
---=== Welcome. Again. ===--- [+] What's Happened? [+] Your files have been encrypted and currently unavailable. You can check it. All files in your system have o6s6f9 extension. By the way, everything is possible to recover (restore) but you should follow our instructions. Otherwise you can NEVER return your data. [+] What are our guarantees? [+] It's just a business and we care only about getting benefits. If we don't meet our obligations, nobody will deal with us. It doesn't hold our interest. So you can check the ability to restore your files. For this purpose you should visit our website where you can decrypt one file for free. That is our guarantee. It doesn't metter for us whether you cooperate with us or not. But if you don't, you'll lose your time and data cause only we have the private key to decrypt your files. In practice - time is much more valuable than money. [+] How to get access to our website? [+] Use TOR browser: 1. Download and install TOR browser from this site: https://torproject.org/ 2. Visit our website: http://4to43yp4mng2gdc3jgnep5bt7lkhqvjqiritbv4x2ebj3qun7wz4y2id.onion When you visit our website, put the following data into the input form: Key: oYPHGM07gyg0B1elZa8h8yU4TYSq+UbQWOI9kODWYO8J4Y69cdWUr7fIC4j7PP1I neb7t/R0F2buS8+hmg4MV1hOngPM/gtzSLTNdAdPJ/4Z2uBDP4+PGyVUBEEIqM5K IwzVl2A0IxA4erR/K/1MdSM5tWvrIOhEmkU/9XP2clU/PPqJei07EEIjFtczaKlS NocYhht2yR4ITvDiIUE0R/JnpyBfXj27jfasP4QypO5hVu4uCO4cBXNvqMQANYDx tNpEvOayGHNsD1RFy73q5tYuwI2m4DJ1Kyv7ObVHWjXqJJszzXoRgV/Xw+Vayfqj gA1P86rVEQIcNZFD51PfSgiJ2O3n4buQmAN0BsQzTzZxUS+GEZZoqt8sQYW6vLN1 O2hAGVm7SJsw0DTck9cQF2VbSoyLqUWPHQCjye9q/EgZZQhayz/DjIKzKeu/15+5 h8so3CGNPgB6YSZJm7HYNrpSswyROCnnirLhRaulCilhOefs6v7rEslcYBdwzDSz pnbbc3CX55g5aX5AlioDZNw5uboTVUYxMr7J6xedxGKtyNMyiOBf+yrrPXPQgO9r CuZ6kjBG5nDDrBI/ZEQUsUQjL/MlgPe/HgfpsRy+fru0DWxDX/daRpV/FXqj3oSj VxW0KPtwXKv6yNNmrtTIxL80bi/eR7D77RlamO6/l8A4qHWjwhCtsV9tBEUtDihI yJFd88FFuHn7HSJYHUoJmynL6iu3SgWDgwFN6LAMOIlfaA2s+tkyrMnjFwOg9Vqo 5g+WUfcSGAyUqD+NAXfacN9AIbmWL+YCs5wgRI1ucjYPiKDkmXLdZWckZ1K4tC3i T5G6jQ8NebLtLFWh3P1sR45TaiWOzVgxY4hMZ+ljfUSe/+QvUdJxOfjdlZxYyTMP dPhN258nWdER87rDjekUEseNwYW5DkqeBI9TDIRFdrfX9iWbPVctbZlyl7p3MMkh gffLM9SoE2Cu0Yqi5Cqvx1LAekXFG/C2x23uCHSVNg2nbPuUZHTgleGCuZhLgBPy LAmZM0f8ZiiJwc1PiuaRgg/ej6aJ+LqRNAmmsohXlri9q97rjzM7iqz6SJDEmmXI 2kTXkWHnzVpZYMDHurp0oBTQJZ/OAVeXJZUk0NUXLhCkiUdKPZq+h1KKMW27nJ3d +DvCwh4D6fZeNnmOMIzdNxt0oaDIbc9qItvrU+gOVhzr1AdcZyqDZgibMse6iePA u5t+bGOsrmJBDX6mYnBI2yXjTH7YGTBqLgigTrMVIpX7jWjbCN5tYKpdLHU4vlTU jAo4PqE0UFjGjfSj !!! DANGER !!! DON'T try to change files by yourself, DON'T use any third party software or antivirus solutions to restore your data - it may entail the private key damage and as a result all your data loss! !!! !!! !!! ONE MORE TIME: It's in your best interests to get your files back. From our side we (the best specialists in this sphere) ready to make everything for restoring but please do not interfere. !!! !!! !!
URLs

http://4to43yp4mng2gdc3jgnep5bt7lkhqvjqiritbv4x2ebj3qun7wz4y2id.onion

Targets

    • Target

      329983dc2a23bd951b24780947cb9a6ae3fb80d5ef546e8538dfd9459b176483

    • Size

      119KB

    • MD5

      a4331ff805b0a8f2a2892777c224b65e

    • SHA1

      2c5521077dd1a6f5f3558351370880aee9ab7c71

    • SHA256

      329983dc2a23bd951b24780947cb9a6ae3fb80d5ef546e8538dfd9459b176483

    • SHA512

      786a6ffdd7206b0f11dd45921826e3685fe4b64b82b4fa26702a30dcb762d4310b3b55683a8c510175ed6a9086125156e676caa3220597f8ed7298f6cdc51799

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Impact

Defacement

1
T1491

Tasks