General

  • Target

    7ac75d8d4390707428b148cf3cad23d804930141fd8ea53cf1a7790f7d1c3c88.bin.sample

  • Size

    121KB

  • Sample

    210615-9bz7rnqjgs

  • MD5

    612f5b62182b5c3a8eb64ecaa2827462

  • SHA1

    9d2bfcbaf44f9e59bbb451dce29e4c7ad6778808

  • SHA256

    7ac75d8d4390707428b148cf3cad23d804930141fd8ea53cf1a7790f7d1c3c88

  • SHA512

    9e001e766a6bb8505a15830b25268f958f79c6ed064b07b70af0165e3a2f967c3689581c012cdd7c3d631076172c2acc0fd1406fac809e835b149669db7a23a9

Malware Config

Extracted

Family

sodinokibi

Botnet

$2a$12$RPOpxSrpuRM679CROU.UxOrfSfy9I/QtKNOfgnyxI8FZcDA2yj8Cy

Campaign

7511

C2

oneplusresource.org

bogdanpeptine.ro

teresianmedia.org

deltacleta.cat

tsklogistik.eu

plantag.de

kingfamily.construction

drfoyle.com

miriamgrimm.de

augenta.com

alysonhoward.com

bristolaeroclub.co.uk

elpa.se

boisehosting.net

marietteaernoudts.nl

leoben.at

smithmediastrategies.com

csgospeltips.se

lykkeliv.net

global-kids.info

Attributes
  • net

    true

  • pid

    $2a$12$RPOpxSrpuRM679CROU.UxOrfSfy9I/QtKNOfgnyxI8FZcDA2yj8Cy

  • prc

    dbsnmp

    wordpad

    winword

    firefox

    isqlplussvc

    infopath

    visio

    synctime

    steam

    ocautoupds

    excel

    mspub

    mydesktopqos

    onenote

    ocssd

    thebat

    mydesktopservice

    sqbcoreservice

    powerpnt

    sql

    dbeng50

    agntsvc

    outlook

    encsvc

    thunderbird

    tbirdconfig

    xfssvccon

    msaccess

    ocomm

    oracle

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    7511

  • svc

    svc$

    backup

    sophos

    memtas

    veeam

    mepocs

    vss

    sql

Extracted

Path

C:\v035n67-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension v035n67. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/72B249B6BCE45579 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/72B249B6BCE45579 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: J4wBNp4y4MqZA5P7JaZJPyzL7pmIgQRlHICfADP+H+5PYY/8fM0hi+6bSvbL8mO3 5bJNfmQuU69jTvEVVX9MrpnEAx+QbujPEpXukw/X1iIceWhjb89sbxGvnS1Okt58 LbQL7M7AkILsBeomE1NLaunujrbHolQd+lloL7Evx3ae/rj28drCO5nb4N2DHP7X 2OZnvgM1fjZGxXaeQcnyANBm1j2k4O7eMUccgOtrW4IFcFGHx2U+Wcr8k9asOY9P R2Dr2dD01X7l0v47unZwJ/A6jTJ9ms0tg0j7UeLgjQQUBbIoKDMRSe8N9er3DFxB hNZn9NYPKTtSvDmUm1VpQAqLsM8gEc7S8/JWdXvyPAVvF21H++JfI60S+cn9M24z stFNggG1hFa8R3mSCXebglNG9h6vg1Zjn2WOts9cpeY3xkaWVASy0Zm5+Y/DZgkG XkkWeLvQyF5ibnsZnyWZU+JYfdVC4P/Xgcf1y9Y0YWE0saN5y1bIOxHroRZhvM+z GkzDvDxitUTVshgCLKHmq62r36iwzqMkQREb32Kp5nAj3/nWfYa2D1NBkQ9BT1YU rU2XjoZ0OKO4ERUBmr2ylYp3zDFElK/ya+wWbotfPlKN6jqj3ScGSKlsNJod1T1+ FSAy7HLxf4BpYvS8TDglX18rlS3xDZvuADkNJR6hk3BmeMoGT1tigDwH/fB9HION 2z5DPkzmjOyiVD97HSKT/5EO1eIznwv12gFSL2KnRbwrgrjG+XbUw3o6pLm1Cv2k H9KD61lN+hoAcbIJ7bztL8PMrvlNSyaWNh2/L/RtqMYRvuBhM8zU3ekf4cEV5HRA QYQ9cWTmqpaaroZc+wLPXaq8hQgGZzc9pKwHGl0qFrUph810KnjvdjcN443cDgUl KvIurVBNsxjhz0YIdhET7R4O5g4OqQNgiDKoqtC+agmWWJ9A27GgpJuGzN65Vl76 NyKfkrWjz5Mn8rLLDVJnyTzLro/OTzEnp3pE6Mxa2edlW8DADa7gs+b6+fwOI53y 22m4VCUlgRlY/P1i9qeKH+D7Bcr/1BOsXbqj4JLFWo7gJOuYrItGyKoQe7KKIzcA TDjvYA8WwmsFSA837U9z93wih8AVukcxVgvYFuroNH3sT+odz8+AsMgt/NrgK+zG zdwzjSEpGzDDaMGlD/5IJX7O6sC1pr6PZIV0woqmOzGurrpPa4PAYQLHl5aeSGgd nwtb4JlplKKYzRM14pvjWNhIhMl+VBRPbfKT3U1Evn91VgcSdjku439XzhpYrY7g FB9+pqwOcnk= ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/72B249B6BCE45579

http://decoder.re/72B249B6BCE45579

Targets

    • Target

      7ac75d8d4390707428b148cf3cad23d804930141fd8ea53cf1a7790f7d1c3c88.bin.sample

    • Size

      121KB

    • MD5

      612f5b62182b5c3a8eb64ecaa2827462

    • SHA1

      9d2bfcbaf44f9e59bbb451dce29e4c7ad6778808

    • SHA256

      7ac75d8d4390707428b148cf3cad23d804930141fd8ea53cf1a7790f7d1c3c88

    • SHA512

      9e001e766a6bb8505a15830b25268f958f79c6ed064b07b70af0165e3a2f967c3689581c012cdd7c3d631076172c2acc0fd1406fac809e835b149669db7a23a9

    Score
    10/10
    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Drops startup file

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks