General

  • Target

    76b85e4484dd1fb8ad6ad9688df5252526c330c8cd9dc18f7768de8b52043349

  • Size

    201KB

  • Sample

    210513-sxasftbac6

  • MD5

    f7bdfc04493a7bd9fb72c77fb696bae7

  • SHA1

    8f2b83f2146550f16900aaf14c63012f57fdcc9a

  • SHA256

    76b85e4484dd1fb8ad6ad9688df5252526c330c8cd9dc18f7768de8b52043349

  • SHA512

    6bd9a6538e8ee2f21e12c3bdfadfc23dd89d05984d55fd388732877a684e5103b67876ffc766341ceffb70c34de64c8895794180c5c8abf6d51375a89f9046d3

Malware Config

Extracted

Family

sodinokibi

Botnet

8

Campaign

43

C2

logosindustries.com

pisofare.co

gavelmasters.com

patriotcleaning.net

bourchier.org

amelielecompte.wordpress.com

awaitspain.com

wg-heiligenstadt.de

mercadodelrio.com

brannbornfastigheter.se

hypogenforensic.com

vapiano.fr

innersurrection.com

solidhosting.nl

fidelitytitleoregon.com

bcabattoirs.org

smarttourism.academy

csaballoons.com

agenceassemble.fr

letsstopsmoking.co.uk

Attributes
  • net

    true

  • pid

    8

  • prc

    mysql.exe

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} Extension name: {EXT} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    43

Extracted

Path

C:\odt\t3v0a-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion t3v0a. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/5397E46DD0367CCB 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/5397E46DD0367CCB Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: cTg4P+0nmJOjaSlx/xmD4oQZwUep7qipMwn7BgOYEFaWBFNQsdPYCYI7or6iNjMd PWbFi2ElvSLe5fj0lZJosUkGtY4IB8obcaIImB3oYEghWzhV/mZNBgSGb78XDCY/ MIvasE5JzZKpYg4mfG6u4PY9Lkm4ajDaK2dP7l+d2Q3sb3YeAgXm95+oIfDzjrn8 pbUKOQgJPB+9j0OBhVdPdBsa7Y+YQw5QEqDNO3omfzh+/j5ChVijPfNBJPvlwiMs S9dzis93cKcUH06OEE4Qbu7XFkQlmG+NBT5FCwElVVmzY1v1zPUzKNGibH/CKLvH V38hMXx/Y4QD464dwXBZQpRHaUzZUieK8x8tqmJtzRe1BOWWDKVe3NckZXvxmRxf bK6Yd3Q8pa8vP4yrJx5cCidDSmokC78p0mSFVuxI7Dw+Gih2DTvrtdmHh2eZlIa5 0yd4+Oklf7t7lQ6qo3wPjfRm7XIrCq4T+sHLKhHnj3zrIb/C94N6iJPzLMER6Jfb T4p7AfAxmZ0byxKxIKk8In0wosYRnZXLABvu4XXKHD5ADDaupnfgHW1Evw+uzvWK a0xv5WhyFZo+/M/4H78nJqYw2nW6TLhFOVOaZr6zDZJGvTfWiOl6k3u0vV9tS4Mt HI6iDincrpHmFP9d118eCkQT3UTHX4E0qlvkR0w+tJdXZTLwyS5sRuT9sDcmFR6C oy70a5ItgamgKDfLleGctyDZci9ROLRoAcvhSfRXW6rdig5cXM6lcCxFHpcuhgZ4 03+giQ0e1x0Livld/w09QOgf9o9FKmE3WBwxSHqUJGn1TJr0ozglggAR9DxN2XdV hYNufFiWgQbJeyod8OJStVeY9YIzWVFpcKNV5Qnqj/KNsiNg0jziY9RBSp4/JOUq eQbl3jNvLENcbGSpxX0qv6+QJxMS6WR5tkL+5wsQVqmiTWmFvw2yG3uVSHHaqTCo YlBkSuDir/Vy2eso3s4FQGIyLJsUCcSZ+/1vogxz2QODwg8jk2IrL6jDpW6Loo2o WrD8VoXHyZJhhdAd4PW6INgtKKoc4SopoHrluUXaOfERXsVF+xzyfItPKmjcmPPr 6xTUkUNm/Rw= Extension name: t3v0a ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/5397E46DD0367CCB

http://decryptor.top/5397E46DD0367CCB

Targets

    • Target

      76b85e4484dd1fb8ad6ad9688df5252526c330c8cd9dc18f7768de8b52043349

    • Size

      201KB

    • MD5

      f7bdfc04493a7bd9fb72c77fb696bae7

    • SHA1

      8f2b83f2146550f16900aaf14c63012f57fdcc9a

    • SHA256

      76b85e4484dd1fb8ad6ad9688df5252526c330c8cd9dc18f7768de8b52043349

    • SHA512

      6bd9a6538e8ee2f21e12c3bdfadfc23dd89d05984d55fd388732877a684e5103b67876ffc766341ceffb70c34de64c8895794180c5c8abf6d51375a89f9046d3

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks