Analysis

  • max time kernel
    48s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    04-05-2021 14:30

General

  • Target

    8c716101e118ac65d7bdb900e0100d012256abb1d7cdf64830e5943a795ccce2.exe

  • Size

    600KB

  • MD5

    f0db9243fdd14d4755f5b12860d0394d

  • SHA1

    ff1b6fc9398035917e232352fbfae8db7805b5ca

  • SHA256

    8c716101e118ac65d7bdb900e0100d012256abb1d7cdf64830e5943a795ccce2

  • SHA512

    824b21d96fa8ccdad18a8af1aa2dd234fb8c8487a6f81d9b98bdd4108c1ccfd28042b4c3f8bef9a74fadbc22853cc027ee4601f30928fd4ad611f2a38562e96e

Malware Config

Extracted

Family

sodinokibi

Botnet

$2a$10$lz3hlPV8Kej9uci3yqtcXekYgZKNgrmR77UkrVKzbLWKZi9Qz/inq

Campaign

5599

C2

bxdf.info

homecomingstudio.com

ledmes.ru

modelmaking.nl

corona-handles.com

botanicinnovations.com

cerebralforce.net

conexa4papers.trade

aco-media.nl

igfap.com

danielblum.info

colorofhorses.com

bridgeloanslenders.com

kao.at

kenhnoithatgo.com

qlog.de

spargel-kochen.de

kamahouse.net

naturalrapids.com

luckypatcher-apkz.com

Attributes
  • net

    true

  • pid

    $2a$10$lz3hlPV8Kej9uci3yqtcXekYgZKNgrmR77UkrVKzbLWKZi9Qz/inq

  • prc

    thebat

    msaccess

    onenote

    agntsvc

    ocssd

    sql

    oracle

    ocomm

    wordpad

    mydesktopservice

    infopath

    sqbcoreservice

    ocautoupds

    tbirdconfig

    isqlplussvc

    firefox

    winword

    excel

    powerpnt

    synctime

    dbeng50

    mydesktopqos

    thunderbird

    encsvc

    dbsnmp

    outlook

    mspub

    steam

    visio

    xfssvccon

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    5599

  • svc

    mepocs

    veeam

    svc$

    sql

    sophos

    backup

    vss

    memtas

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8c716101e118ac65d7bdb900e0100d012256abb1d7cdf64830e5943a795ccce2.exe
    "C:\Users\Admin\AppData\Local\Temp\8c716101e118ac65d7bdb900e0100d012256abb1d7cdf64830e5943a795ccce2.exe"
    1⤵
      PID:1044

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1044-60-0x00000000013A0000-0x000000000152B000-memory.dmp
      Filesize

      1.5MB

    • memory/1044-59-0x00000000013A0000-0x00000000013C1000-memory.dmp
      Filesize

      132KB

    • memory/1044-61-0x0000000075721000-0x0000000075723000-memory.dmp
      Filesize

      8KB

    • memory/1044-62-0x0000000000080000-0x0000000000081000-memory.dmp
      Filesize

      4KB