General

  • Target

    a660c9395c1806a33b169543591a44f10440b4af71309ad2fe65ff1b91a8bf5c

  • Size

    121KB

  • MD5

    d6bc66cfaf703438452f048fda3515c5

  • SHA1

    b64cf2d9aa93662c00f4b5c1f6a7bc10eb1fe08a

  • SHA256

    a660c9395c1806a33b169543591a44f10440b4af71309ad2fe65ff1b91a8bf5c

  • SHA512

    4c51f9b398b8d2cdbfc9bc13f460561b0ed802a95319e257e900636df420350cb7321f5d740e3af5bd25a93976089d8d5988963c42513e74d3cfbce5ded94bee

Malware Config

Extracted

Family

sodinokibi

Botnet

$2a$12$46NBjD0kAO9VDx1znxHAWuKP1ZRAxgTG6RpuUqth6X.6ppz8QmCCK

Campaign

7748

C2

answerstest.ru

bigasgrup.com

henricekupper.com

abuelos.com

shsthepapercut.com

malychanieruchomoscipremium.com

4youbeautysalon.com

dutchcoder.nl

shonacox.com

elpa.se

accountancywijchen.nl

nicoleaeschbachorg.wordpress.com

seitzdruck.com

gratispresent.se

jolly-events.com

facettenreich27.de

kojinsaisei.info

space.ua

plastidip.com.ar

educar.org

Attributes
  • net

    false

  • pid

    $2a$12$46NBjD0kAO9VDx1znxHAWuKP1ZRAxgTG6RpuUqth6X.6ppz8QmCCK

  • prc

    LogmeInBackupService

    kavfsscs

    BackupExtender

    DLOAdminSvcu

    AmitiAvSrv

    Rtvscan

    TSSchBkpService

    ccSetMgr

    SPBBCSvc

    kavfswp

    NSCTOP

    lmibackupvssservice

    Smc

    BackupAgent

    dlomaintsvcu

    Sage.NA.AT_AU.SysTray

    BackupMaint

    ccSvcHst

    ShadowProtectSvc

    avgadmsv

    CarboniteUI

    Microsoft.exchange.store.worker.exe

    BackupUpdater

    kavfs

    klnagent

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Hi there! Personal greetings ESD-DLGR IT Administrators! We have downloaded all sensitive data, including personal data about your clients and employers, they Passports, DL, etc, corporate databases (clients and employees, email db backup), reports, projects and many many other. Ask us - we will provide you with proofs. We will public all the data in case you refuse to pay. Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/{UID} Warning: secondary website can be blocked, that's why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DON'T try to change files by yourself, DON'T use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    7748

  • svc

    Amsp

    Altaro.HyperV.WAN.RemoteService.exe

    MSSQL$SQLEXPRESSADV

    MsDtsServer110

    "Sophos MCS Agent"

    "ds_monitor"

    "Sophos Endpoint Defense Service"

    "SAVService"

    "SophosFIM"

    VeeamEndpointBackupSvc

    ProtectedStorage

    Altaro.DedupService.exe

    "ProtectedStorage"

    Altaro.SubAgent.exe

    AltiBack

    klnagent

    "Sage 100cloud Advanced 2020 (9920)"

    SQLSERVERAGENT

    "swi_service"

    VeeamHvIntegrationSvc

    "swi_filter"

    AltiPhoneServ

    ds_monitor

    "Sophos MCS Client"

    mfevtp

    mfewc

    mysqld

    psqlWGE

    Altaro.OffsiteServer.Service.exe

    "TeamViewer"

Signatures

Files

  • a660c9395c1806a33b169543591a44f10440b4af71309ad2fe65ff1b91a8bf5c
    .exe windows x86