General

  • Target

    de20c90de7becbb2f8b92ac42d71a3db3db498472746d0d6f53c368dadba44b0

  • Size

    122KB

  • Sample

    210617-2n1xavmafs

  • MD5

    32fff05663093102154e887f71854b4e

  • SHA1

    8d31d42e61aa0adb5aaff19427a214fd1b65e4e3

  • SHA256

    de20c90de7becbb2f8b92ac42d71a3db3db498472746d0d6f53c368dadba44b0

  • SHA512

    b5e34c78159396f43042ad19b5c8217220b475e062749e5c5123b166e14ab4af80cea7f856453ded226ea02a507e081a501f51196424f93e86d586ba26f70285

Malware Config

Extracted

Family

sodinokibi

Botnet

$2a$12$Dm9/g7ixdYcB.yp4ByxPvOfmC.guiI9ePQCpl6GdxYvijcYzjSecK

Campaign

7028

C2

supportsumba.nl

ruralarcoiris.com

trapiantofue.it

thomas-hospital.de

notsilentmd.org

vyhino-zhulebino-24.ru

abogadosadomicilio.es

vetapharma.fr

aselbermachen.com

yousay.site

firstpaymentservices.com

jusibe.com

chaotrang.com

panelsandwichmadrid.es

conasmanagement.de

planchaavapor.net

wychowanieprzedszkolne.pl

ditog.fr

mirjamholleman.nl

edv-live.de

Attributes
  • net

    true

  • pid

    $2a$12$Dm9/g7ixdYcB.yp4ByxPvOfmC.guiI9ePQCpl6GdxYvijcYzjSecK

  • prc

    firefox

    infopath

    sql

    xfssvccon

    steam

    tbirdconfig

    ocssd

    powerpnt

    ocautoupds

    isqlplussvc

    oracle

    agntsvc

    visio

    thebat

    dbsnmp

    dbeng50

    sqbcoreservice

    excel

    onenote

    mydesktopqos

    outlook

    mspub

    wordpad

    msaccess

    ocomm

    mydesktopservice

    encsvc

    thunderbird

    winword

    synctime

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    7028

  • svc

    sophos

    vss

    veeam

    sql

    backup

    svc$

    mepocs

    memtas

Extracted

Path

C:\se6lon30-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension se6lon30. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/965DE17EC7662274 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/965DE17EC7662274 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: 5+YLfqw0u8BnuFMJTM3PurR1GWPJnkCvmiFaoczwX4Na0b9BM5htFb2h7jjgPefl 6UzRyKL65eu4Y4p8rwOLMDX6jYVSnrY2+61YvufER3kfsCWTKZ9LFIITN1W56Yj8 ALgJ/a70GSnAYfC2m+bKk1+lKSQs3hWlHMJDcaMOL8nlG0JKIQNeQvi7/4na3rM9 9nMKeEd/zIE/CZy6MSBZ2srZMCXyY1NM59kW9xDw5jFnJ4QlmF3jvAvGyfYjx68Y YgT6+pwgwf3/XeOxF+b3evsS6sLXo1U34mFSBx8GKEarJc9pigz0MmLNFj55Sc0c VRypxriRZNwRrRAiGXSIQEeZFxfoLTlbXWnAPtqfq7UYNoXnj+M3oDwT5n+TO8th KZ6wulsXa1hHENIsrH8pyWUhmlDpXVurWXLzUdeJtNiOf/50nfLbRz0PvsUTZYA9 DKbmFIr1CutTGcj9/5o61ccivJt4DZ1FywiwNp34F0h/SrNtb3A43RDg1NR5gmr/ evwMKE2vk5v+HDY9WyuI64bawrhksk8UEqTEFZxLqzINSX7TeERTv3Nw9DN4dckp z9KJYR8tBHU+GjC7kVVJ+Go0i7porvMuDoh9gKXP+OdhQwEeMfQ+AL1kH3MuS840 28S7pm+/ZpZgiu0i2I9wGg/LMbnEfKEuutIMlhWBndWHuGSiW8Wyp1qSXJXV9xej A7FqS8R6Z0p0DE6vRY8p3vEV0eS0lELWGMEkf/KRvdk4WXzYrmePQRrfQ0QscDA4 pjE+Ns93DgZsGXUnX4r4UJdVpSEtIGf2c6NqrshUH8YL3ODMkf/ajjdzw1zG3V1W r7AG6QaIoh5fT8Ie4bMNft3GJsQavlstmaAmuQhNosa0TPEvMqK0gZ8sgYqGH0Cl 61koDE9dCksNDkvmueyzpGrF+tXppOc3LIj9TaeKIJUJyCq1TLy1XDWZLUc5ZWMn zLBh/LuBnSfwiaXRjMiAHANjBRrhsgTg9UYRstqxZE1sKQtXUeHWQrf7zwW5BTOZ J7yu+/drt4N6mQSimPSIsjDTJcYd5bnV9Y82C472P6vfLP12ANCvhMEJ1sPjRKXf SSR4Pa+EEQZ0L1qQ39qFoq142mUqZ0bDeBIYg00P6utEb0/5TS9P3GBdhpQzwxdM 5e8dOIsan/WiD7CxmFQFeSP0Cwbmr0a60UWjKEdF2qFWRgHFVHfO9TktjT9DpaQt JFTKsxuesL1BIUqcxPAM5wuMX3Fi5e+Bnjr7y3GU+3oUcGr2OWdTO8gRISj5kq+2 GvcyJDEwBkqtxA== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/965DE17EC7662274

http://decoder.re/965DE17EC7662274

Targets

    • Target

      de20c90de7becbb2f8b92ac42d71a3db3db498472746d0d6f53c368dadba44b0

    • Size

      122KB

    • MD5

      32fff05663093102154e887f71854b4e

    • SHA1

      8d31d42e61aa0adb5aaff19427a214fd1b65e4e3

    • SHA256

      de20c90de7becbb2f8b92ac42d71a3db3db498472746d0d6f53c368dadba44b0

    • SHA512

      b5e34c78159396f43042ad19b5c8217220b475e062749e5c5123b166e14ab4af80cea7f856453ded226ea02a507e081a501f51196424f93e86d586ba26f70285

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Modifies Windows Firewall

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks