General

  • Target

    94379bb2c305a5754d60ae3d27daf5f7f4758ed3dad21ee1969640fd9e84e83f

  • Size

    122KB

  • Sample

    210601-apbkktp9ws

  • MD5

    b7ba5484a95ceec8374f49c21212853c

  • SHA1

    a942aec58910ad72eff293d926fe9943397eb1a7

  • SHA256

    94379bb2c305a5754d60ae3d27daf5f7f4758ed3dad21ee1969640fd9e84e83f

  • SHA512

    7b2d4c76116159f800af82c6aaf9d3e31174d3f5bb98ecdfa4c6b6e0407aeed724da58e0b5d13cd3ea4765966834d56579a5835c96cadc389fc64da54b89b362

Malware Config

Extracted

Family

sodinokibi

Botnet

$2a$12$YH5CS2u/j/wMybBnXKMv/uv/723QQaCxIPzbfbDFDZBs0Pj.s2a/K

Campaign

7864

C2

mediaacademy-iraq.org

micro-automation.de

eco-southafrica.com

musictreehouse.net

buymedical.biz

falcou.fr

liikelataamo.fi

caribbeansunpoker.com

wolf-glas-und-kunst.de

berlin-bamboo-bikes.org

tenacitytenfold.com

maasreusel.nl

toponlinecasinosuk.co.uk

farhaani.com

tarotdeseidel.com

whyinterestingly.ru

pinkexcel.com

mirjamholleman.nl

sofavietxinh.com

smejump.co.th

Attributes
  • net

    false

  • pid

    $2a$12$YH5CS2u/j/wMybBnXKMv/uv/723QQaCxIPzbfbDFDZBs0Pj.s2a/K

  • prc

    sql

    outlook

    winword

    thunderbird

    agntsvc

    ocssd

    steam

    synctime

    firefox

    infopath

    msaccess

    ocautoupds

    dbeng50

    visio

    thebat

    encsvc

    wordpad

    tbirdconfig

    isqlplussvc

    sqbcoreservice

    mydesktopqos

    powerpnt

    xfssvccon

    mydesktopservice

    mspub

    onenote

    excel

    oracle

    dbsnmp

    ocomm

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    7864

  • svc

    sophos

    vss

    backup

    veeam

    sql

    svc$

    memtas

    mepocs

Extracted

Path

C:\or4jw5-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension or4jw5. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/52BB75D1DA7DB3EE 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/52BB75D1DA7DB3EE Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: DDM/4hH1jHMZ//qMGsBTToxH/k7+v6SZyDFKAZUPi5c12sy+3/2mmQJcb78KzBaJ bUEC7ZUfohOM7r/Ds7O4qj2Jv6Uy7HOymMc1NEjEzWBh5artugQRZbizwV3M2L2Z AdYSSszcGg8PT1TRPAeVhY+9S3VCzTIroqtVz6vOZUY3mECMNqpp/hyToFAZTIGQ MK7BwXMEBcNP1YllOFcaZa0r+8h68v8yITUqkyUZCkZ42rxjWyP6CnCRus2PdWRx HJHvE3+h5yZuTJHGyTsWYWmm397IosH57jXyb8RgYFScY3YnuzSVYMKtxuipAiHF CjyknTVLnnwyM1gmOBPL5Pu2xI8NIVOVWIOpBf1aEO04Cra5u3oJWG0Np/oOEHfx yFjk+Cqj1VRv4lYRcGO1jphCtllag9r9Dojjb7rhqcVyLuz+CwcU2DK7h5ThDMbD W6CyoXo6dIHGvVn36UQUpI09g6SLNWCNfh7mjzP3XYb7wcP/e5hgpSSAg/h4rNJk gk1zpPqOGtOYSTUnVMTnUsI37ZdFyiB/pg7/9NhoraH3UAC/jn+g6PQ3vUmfaRft OwfrW6Vx3hYtJvYkpkeIV4RASNb9uSrDGANQf6H+hmDIjAddG8dwHrXA397fbHIk fwEMho7IOnCcPjaBoeuxH+mtsihjK2vIxQAI3BjeiQ0aA4xwbDnpZgV9xZohXHDT mC96b3kvK9bQvtkg6MxgrNGADTmqVp6M/2zsel4VTGIgGX67QpPAfZh01Da/p8Xu 14lzJpg3uQUvg0l307qfSVaO4FfJMfKQCF7PHWhDIjlvYh5IbQ53nH1+7hnblIBa aw/ohcmob4UOpbo/C4qxfuzLQh3g9s23T2/KcrufvRgdZHaGrQhOiCR/AwD1OSr5 1hxYmwo8qcE9DROG/h+Nr9anTTnwmXx9m7W1j7voH9FfqEY7FgkvoDboaEnf6KPg 8nq80iFaiK3gC4UW2jGA0ErcGPCHmHMgYmqFnb4c5ddRnBb+PX24czbCPuDLaFmx IGJRlhmOiSmdOKl3hE6QUmGMqNU1rtC8DtSRZO2bxZNZBkoLrc+BbnsrVEtYN7x0 7ijtBbkVbuSunBdCPyBFxf4nrr4RfIDy3V1nw7wA/qxGu0MIPjfKYGDqqckTzmrk atDWRcXHgsyzZkpV6dgDE6wHN9nWo2W32Yjvnzp0LR13PETwQboBX+G2sSake4GC 3hpfA1Hfdm5DvwQVUyIzzZJNs5AFYwYspMEHlmxcneSQaE5uT4YyYv8LY5KQoDnR DD8c60Wx ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/52BB75D1DA7DB3EE

http://decoder.re/52BB75D1DA7DB3EE

Targets

    • Target

      94379bb2c305a5754d60ae3d27daf5f7f4758ed3dad21ee1969640fd9e84e83f

    • Size

      122KB

    • MD5

      b7ba5484a95ceec8374f49c21212853c

    • SHA1

      a942aec58910ad72eff293d926fe9943397eb1a7

    • SHA256

      94379bb2c305a5754d60ae3d27daf5f7f4758ed3dad21ee1969640fd9e84e83f

    • SHA512

      7b2d4c76116159f800af82c6aaf9d3e31174d3f5bb98ecdfa4c6b6e0407aeed724da58e0b5d13cd3ea4765966834d56579a5835c96cadc389fc64da54b89b362

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Modifies Windows Firewall

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks