General

  • Target

    2f00cd865ea857a2d9d399385c408e99f9daaa1b6c193f2195393bd459524b3e

  • Size

    122KB

  • Sample

    210617-1wmkelevgx

  • MD5

    798673f7697440af57c30e12033d5608

  • SHA1

    fd083aa266721526a168497d7e26174e151f606c

  • SHA256

    2f00cd865ea857a2d9d399385c408e99f9daaa1b6c193f2195393bd459524b3e

  • SHA512

    2ed6d80a94dccad418a8233f2e493fc56f24381386f420974373c246d3aa1641cb266d5281979d771eede480faf86e76dd4fe39af99bf9bcead62cfccabb14ed

Malware Config

Extracted

Family

sodinokibi

Botnet

$2a$12$W.DtlzL36B6qy8LouD1bS.wGlby35ox0cuYzGREKy8BWQvKtLao/.

Campaign

7846

C2

jeanlouissibomana.com

craigvalentineacademy.com

better.town

educar.org

bunburyfreightservices.com.au

dr-pipi.de

apprendrelaudit.com

brawnmediany.com

bayoga.co.uk

greenfieldoptimaldentalcare.com

charlesreger.com

schlafsack-test.net

modamilyon.com

edelman.jp

dubnew.com

kedak.de

celeclub.org

triactis.com

stacyloeb.com

parking.netgateway.eu

Attributes
  • net

    false

  • pid

    $2a$12$W.DtlzL36B6qy8LouD1bS.wGlby35ox0cuYzGREKy8BWQvKtLao/.

  • prc

    msaccess

    mspub

    visio

    sql

    mydesktopservice

    wordpad

    synctime

    dbeng50

    mydesktopqos

    xfssvccon

    steam

    infopath

    excel

    ocssd

    oracle

    dbsnmp

    agntsvc

    sqbcoreservice

    firefox

    ocautoupds

    onenote

    winword

    thebat

    outlook

    thunderbird

    ocomm

    isqlplussvc

    tbirdconfig

    powerpnt

    encsvc

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    7846

  • svc

    sophos

    backup

    vss

    veeam

    memtas

    sql

    mepocs

    svc$

Extracted

Path

C:\1l163e-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 1l163e. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/D2188B41B930FA1A 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/D2188B41B930FA1A Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: tAwmCsZzduKRXvqwWfcZ8vIFsnH95rXmz2H7N9QTnOOkSHUZqgCdYUjL/mkTTfXZ 3FNF+y4WqM0H0PkxmKZQdFFs9xJx37USHpPoshRoOqvIFPjDKZOfF9bk2/O/Fwco wbIRaWzFElVtazms3uWWGQ07lGelkdLOAkUhgjZCbTTYIZJAGkahDu7rixoClZXh FMS3qlxC0Sl5Paz82adhBPeefyXxtr3QvtqkGnHs0dlvAMMmlBYfKRGiFMLjlPSP EkSYxlAbyRg7V0or9W+5SULoZg7TSa8I/DdDBIqRcljSyaDLDwwNXSs59CAFPAiU oztREUfUY+owrVp4pVMwF7VvPMSPRRAQZkm5x9bwmDDAxggiNrw8sz1UFOsueQ7X pzGGLytKfsdMg4vEIq8MBy957wIT0STs8d5nU7XcoE4bbDBUzKrh6rBmf9EYWKlW nIlv8UBN1mn6fNribdVtRr2J4PYlasZ1+LaL4y+8IY0yt9c0yWnjgpOExmXLsk6g Tee2q9Cyag4mXCqx3KBqX0MyBthosUdvfLkPDoS0N3pQP2H8r/FaVTxSTyEViqwW 6fHVvLAX/Yt2C/hJ2iMxKmFNZkRG5FPqLYhIPMA1z/fJiN2wkctfWQ+pqJNOj0pw ijO9NnA+em5pQMGRup8OifB3yGGHpkookwE9c4deGyR4ASBV2PeWQojwSeh8id9r RnKVyFLYfeLBh10DE6eMrSOi5z3cLR2GbHo8NoYxbQ5Nqr7vEpkSc3bu6GTYhXIz /Hw3t6xWhEB3zhaCIt3NUKjOehGNsRFjfubmy9nS3ux5oj2UluE5Kqjd6eaor0j8 g+CNCwQtvrB9jMlhf6xjjpKG8vlhfi+d9fWF8wn8zpIrNdWYm0Hpqg8QF+nif8vt l6eint4HY7dZyTcDVU53rXup4cYZY+X7sSxJzE2Brf4sHwDHk03VuSxUU0hIqQFa 9BH9tKS4weUJyDDQwD3tyR/kBk6CZps92g2MVjnByQ2y3zzq/ARrgz5+w1XIwEeg UmeDSd2WIbNSXkdx5xNzsTV8VZ2D/ccGRRtVI5XBJF+Ied0zw9fziDyEnh++vQ3U 9PJ2JEeE+MUPWoVo514U1CvCLWqTylWCZkV5VeU7ZCPZynAzuj6qm4MPIzlMZq5q lgWXQJ29YXCTCJMCykrcVZdV7SrlBoY9hfs4KG4M1DwwKiNnmt96Ll3crZA8gXu+ paaWqCPR5Y+3JUu6EulVnhPbY6bzXhqHidudPqrYhZ9veSpxMPQYv/yL/qmwpl1i 6oULG2rz ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/D2188B41B930FA1A

http://decoder.re/D2188B41B930FA1A

Targets

    • Target

      2f00cd865ea857a2d9d399385c408e99f9daaa1b6c193f2195393bd459524b3e

    • Size

      122KB

    • MD5

      798673f7697440af57c30e12033d5608

    • SHA1

      fd083aa266721526a168497d7e26174e151f606c

    • SHA256

      2f00cd865ea857a2d9d399385c408e99f9daaa1b6c193f2195393bd459524b3e

    • SHA512

      2ed6d80a94dccad418a8233f2e493fc56f24381386f420974373c246d3aa1641cb266d5281979d771eede480faf86e76dd4fe39af99bf9bcead62cfccabb14ed

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Modifies Windows Firewall

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks