General

  • Target

    3b0cf9bc480a7fc4a560ab26cd35a72313b1fa49bf6ef208c434a32b3f1588c4.bin.sample

  • Size

    122KB

  • Sample

    210609-qe81dy54fn

  • MD5

    c975edf27d1683d844191ad565c63bf8

  • SHA1

    f79f406e7a73b0578836fb6e182da96db1766e1f

  • SHA256

    3b0cf9bc480a7fc4a560ab26cd35a72313b1fa49bf6ef208c434a32b3f1588c4

  • SHA512

    cba6f681aaea9555bae1e65c8e556b20de49b9ba96d4f6f08afd8b4aedaa12f2083294a0e8bcc6921daead6d73d8044cbc3dd356c9b4e959e5f0a805e6864a04

Malware Config

Extracted

Family

sodinokibi

Botnet

$2a$12$DvcTuQr/NbqkQMKpwFKY6OPFIcBdrWodqYXAzq0Be2qUPdH/E0EY2

Campaign

7854

C2

spd-ehningen.de

brevitempore.net

simoneblum.de

psa-sec.de

maasreusel.nl

ditog.fr

ventti.com.ar

stoeferlehalle.de

polzine.net

tomaso.gr

carrybrands.nl

idemblogs.com

commonground-stories.com

praxis-management-plus.de

buroludo.nl

funjose.org.gt

cimanchesterescorts.co.uk

xn--vrftet-pua.biz

bordercollie-nim.nl

tanciu.com

Attributes
  • net

    true

  • pid

    $2a$12$DvcTuQr/NbqkQMKpwFKY6OPFIcBdrWodqYXAzq0Be2qUPdH/E0EY2

  • prc

    firefox

    sql

    thebat

    dbeng50

    ocssd

    outlook

    synctime

    mydesktopqos

    mspub

    dbsnmp

    ocautoupds

    mydesktopservice

    visio

    onenote

    oracle

    winword

    steam

    infopath

    sqbcoreservice

    excel

    thunderbird

    ocomm

    isqlplussvc

    agntsvc

    xfssvccon

    tbirdconfig

    encsvc

    powerpnt

    wordpad

    msaccess

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    7854

  • svc

    svc$

    memtas

    veeam

    backup

    sql

    vss

    mepocs

    sophos

Extracted

Path

C:\rsn19h-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension rsn19h. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/B61641F27C10D473 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/B61641F27C10D473 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: 75UTwbirE917/atuh/xw9SxiG8JwTYRRqxqzjy+DArkQCAgBSyr7RR2jmfqqW4rE acBCIf9p/28VGsrWc9broDwaF6ryigmgbpe+8lH7U7Fg6Dn1r+Q69hwyJDym50Rj ds/6CAxBFbwi8qKFrnYxhybND+Sd4mvAvh2qlW8NX+aEXX0LW5xDJ1kquiSE7PXt s2gr5xTOsAxUGCuNQslOWu6PVe38FC2U4tDbeGxWZ7Kye7j7HsOzCLgpFeQB9VQd 0SjpsFjrzz8IZSju62dnHoTnoEmDFaUDgkAgOqvVtr8QPNbwxIOeR0xeWn2vQcWG NyTJQFWOLKiylVPUny3YF9kOFeVcF4HLVTp9RudFYYqdHpJ/HRMj8URDR+2gggIE i7k2zUlgfWdEjcrw1Jo5B7XzcuuAgydGbWEbcg6L6ucy9oJltnanGPJMpakCT24W lUl7bw+ULqhLb+NFxedy2qp8OHi7eX6j6XmkW73WcX6W0NpGDxhnkTwDskMT+rHr 74Cf03zGCIlXPnF86DhLaaiBl0OL/gm7f3JyP6mPrPiGm40qjo+xO8p29cdNT4L4 8+j58EX4TOSboQAyjqZ7sTc1cfammulTTQXkf2sjQR86aTED2s3yrOib1dwErO5F f31QJ5PiUpa8SV3yu+Bw0mCRTAYB5B5dvTwf1t9emet2PT9N+liDd7LhxOWTifOU pUr0haJo5VnUvp7fIA1QHsarVIuubmtBO782a+VFOJeBGrWbeO7QqEmof2uJau1A xVqrGV2IAFGz/UNYme5ebSQS9+vEcEH4RmRDV/7U/PKWiIh7hlWdmoKSRPbRki9Q Kcv5W89rIb3kwKpPpzfVokzIwbQG8YuVyATHvx0wLzCw/chCfHMh6N9Tl69ix3mi AmeEJPuJ7tEBwLJZU0/1+FfjKYvRSyvSGm+P379kbZOrPfo91XcyLvvEo9gLR4vH YCVRFu8uGVfrA1IsoCr0QfjsATnQLSJcl3V8LxedhGeW4Go0ZF91M8ymY3sjl8Tl d3cKzfaQnNgjoIE2+4K0OH3e4eLxDS2yEcf5tTocJFc1XHrSAdKg1f2sYDLaoTmw Ysh78qgsqyoqucumP/KHwWlgTjN19hO908NmXapbuYM4bdZfW6UeRbSq3YpWtW5R H3NYTtWtGSoWrs8lUrTWGjABFA8atw3q1IkhayzdCogi6LwGfpPUWSS4gjG7GRzv OsVDB+SEU6A2Oh1m4RCOYc2dTmW9opE4HDAPyn8xSz6ZeuvdS0bTAIJEaUHD4Ojp 0n7P/OvR ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/B61641F27C10D473

http://decoder.re/B61641F27C10D473

Targets

    • Target

      3b0cf9bc480a7fc4a560ab26cd35a72313b1fa49bf6ef208c434a32b3f1588c4.bin.sample

    • Size

      122KB

    • MD5

      c975edf27d1683d844191ad565c63bf8

    • SHA1

      f79f406e7a73b0578836fb6e182da96db1766e1f

    • SHA256

      3b0cf9bc480a7fc4a560ab26cd35a72313b1fa49bf6ef208c434a32b3f1588c4

    • SHA512

      cba6f681aaea9555bae1e65c8e556b20de49b9ba96d4f6f08afd8b4aedaa12f2083294a0e8bcc6921daead6d73d8044cbc3dd356c9b4e959e5f0a805e6864a04

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Modifies Windows Firewall

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks