General

  • Target

    7c8cb66e9e5ac66415273a48528e1b2f781003f2109b5d704254b9e91d745a34

  • Size

    122KB

  • Sample

    210617-47c9zmg5cs

  • MD5

    9ccb042cb5bbfba12d009ea0b5f1a660

  • SHA1

    9f8ef2e46e22f12c889a8644a2129202602feeaa

  • SHA256

    7c8cb66e9e5ac66415273a48528e1b2f781003f2109b5d704254b9e91d745a34

  • SHA512

    deef869719908687d9f63ffc2ba37c7ee340b5ce2ad9ecc3aba8849a2a5562904ddfa1bb4e1a0ad9f43944e6a198022496921f7f0658553ff5e37d815699fce4

Malware Config

Extracted

Family

sodinokibi

Botnet

$2a$12$Pp/8XmG3qTbxiao4V0xxj.5SlhVEhubbLHsOv46AWjlVoTe8KLgo6

Campaign

7960

C2

tanciu.com

teczowadolina.bytom.pl

deoudedorpskernnoordwijk.nl

otsu-bon.com

cyntox.com

icpcnj.org

praxis-management-plus.de

tetinfo.in

systemate.dk

entopic.com

simplyblessedbykeepingitreal.com

ihr-news.jp

homesdollar.com

tampaallen.com

jacquin-maquettes.com

abogados-en-alicante.es

knowledgemuseumbd.com

creamery201.com

ki-lowroermond.nl

xn--thucmctc-13a1357egba.com

Attributes
  • net

    true

  • pid

    $2a$12$Pp/8XmG3qTbxiao4V0xxj.5SlhVEhubbLHsOv46AWjlVoTe8KLgo6

  • prc

    infopath

    steam

    isqlplussvc

    onenote

    firefox

    ocomm

    xfssvccon

    thunderbird

    oracle

    visio

    excel

    encsvc

    msaccess

    dbsnmp

    dbeng50

    thebat

    sqbcoreservice

    mydesktopservice

    mydesktopqos

    ocautoupds

    powerpnt

    winword

    synctime

    mspub

    wordpad

    sql

    agntsvc

    outlook

    tbirdconfig

    ocssd

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- We strongly encourage You to pay your attention to this message and read it to the end. All Your files are encrypted, and currently unavailable, now all files on your system has extension {EXT} Before that, all of your most important personal and business files were backed up to our secure offline storage. We took them for temporary storage - but we don't need your files and we are not personally interested in your business. Our encryption algorithm is the most technically difficult and max resistant to burglary. Only OUR specialists can decrypted your files without loss(!) Any attempts to decrypt files on your own lead to damage them beyond repair(!) Best way to you will be consent to negotiations and mutual agreement between us. To connect us you need to download TOR browser and follow the link to begin negotiations.(You can find full instructions below.) We are waiting You and ready to listen all your offers and discuss them. If You will ignore this letter - we will have to sell closed auction all yours private files, photoes, business correspondence, documents and business files + with our analysis of your work activity (weakness of your business, financial violations and the opportunity to profit from this information). It will offset our financial losses. Or we'll just put all your files in the public domain, where everyone can download and use them as they wish. * For TOR Browser http://dnpscnbaix6nkwvystl3yxglz7nteicqrou3t75tpcc5532cztc46qyd.onion/ We are known as "Sodinokibi (REvil) Ransomware". For example, this article: https://www.coveware.com/blog/2019/7/15/ransomware-amounts-rise-3x-in-q2-as-ryuk-amp-sodinokibi-spread You have a guarantee that your files will be returned 100 %. And remember, this is only business, nothing personal.. We have a concept of business honor, and we can promise something if we come to a mutual agreement: 1. We guarantee to decrypt all your files in the shortest possible time 2. We will delete all your files and forget about your company. 3. We will show your weaknesses in your networks. .-= INSTRUCTIONS TO CONNECT =-. How to get access on website? You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ---------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all your data!

  • sub

    7960

  • svc

    mepocs

    memtas

    veeam

    sophos

    sql

    backup

    vss

    svc$

Extracted

Path

C:\cf326p7w-readme.txt

Ransom Note
---=== Welcome. Again. ===--- We strongly encourage You to pay your attention to this message and read it to the end. All Your files are encrypted, and currently unavailable, now all files on your system has extension cf326p7w Before that, all of your most important personal and business files were backed up to our secure offline storage. We took them for temporary storage - but we don't need your files and we are not personally interested in your business. Our encryption algorithm is the most technically difficult and max resistant to burglary. Only OUR specialists can decrypted your files without loss(!) Any attempts to decrypt files on your own lead to damage them beyond repair(!) Best way to you will be consent to negotiations and mutual agreement between us. To connect us you need to download TOR browser and follow the link to begin negotiations.(You can find full instructions below.) We are waiting You and ready to listen all your offers and discuss them. If You will ignore this letter - we will have to sell closed auction all yours private files, photoes, business correspondence, documents and business files + with our analysis of your work activity (weakness of your business, financial violations and the opportunity to profit from this information). It will offset our financial losses. Or we'll just put all your files in the public domain, where everyone can download and use them as they wish. * For TOR Browser http://dnpscnbaix6nkwvystl3yxglz7nteicqrou3t75tpcc5532cztc46qyd.onion/ We are known as "Sodinokibi (REvil) Ransomware". For example, this article: https://www.coveware.com/blog/2019/7/15/ransomware-amounts-rise-3x-in-q2-as-ryuk-amp-sodinokibi-spread You have a guarantee that your files will be returned 100 %. And remember, this is only business, nothing personal.. We have a concept of business honor, and we can promise something if we come to a mutual agreement: 1. We guarantee to decrypt all your files in the shortest possible time 2. We will delete all your files and forget about your company. 3. We will show your weaknesses in your networks. .-= INSTRUCTIONS TO CONNECT =-. How to get access on website? You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/74AE0237C84165E8 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/74AE0237C84165E8 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: 5IAZr1KiXMRWD92nKdNQcvBPlw/tmy69gCx5gMd0R1tJpfYBvcIXVmiP7k769edU jV2Mo6I9rcIT+zMqmCdRj9SST7L2hLPfS0CoGmjz6Tfa4/IjiedMe/zZI7ibQkOE ABX1CLVptWMEucoNOpBFiNl0TsetuJXjMYrUJ85uG8VMurk1LeMDluI+Kgt91reM nO9ifuWASFg/5cjkbMEz7mEtlmB3LOpaJwoMkd/qCOSSkKdGnGqDAISTi4EUzsVp Ofnp26Tn0S6mr/jdzhxcT2aWCS+uCiDcKTdkhz3iITntDS5kC/InERvi29o+dQvv lbdYEPUpQ5j1+CWyGjhyPSddYqtGMURndfd248G3ISumlXQXfB+6sUGp4LGugiwf UMkiUpIEcO4u04IYY7IQSWhZCgHHKzNSiN27Yptv78iPxS4Qt2PesDYO3naL+Oj1 lIN/msciISOge622wt/HA6ouVJc2/nreLCIMToCvS7XM9P1f1mOMDa90ZByHDEZa W+9ZWgdW/5i9YORFopNc/9FMd/Q+Cs8wwin1bXL0dgVRgldrg/ZEf9tyvWi5GK2M XgnfcVLUc+pHptpjsrj6VTAtKoVwvC0rP1CnaAB3oW36vnZsHs5/915CLTRFYdYu MDTNQKIAz3hOl4Nnwdz1oBjwU3mk9QsMBCiYF1gvN+djzjfbm2QgLdByV8MLpjgh Ak6fidMMeTquEpEQNesVoucvLx2+Lx4HJIAwMUnh/FY8BLA1DL0pqqjgLgKDyRmn unYULDl/lvAcYxM0eQ/DXTU64ZwHUeaQi8M9k6BWzA8xCxZWSnvS7W2PIpl5NFot 9Hj6zKGr8HD2l+Sceu1gzXWSFUVPfSUWRJpJMcP+hBIE9DkU4aEeorgmgAGDrNVY h3niB+XLDQ9t4C/RfCCK0ixNs+9DxPHbb02nSpxKFq+tiqMM3+VTpeKJSBkw7t8N DmdGz40yeq2bFk1a4z/lGC9fec4sVkuGpfQiaO0484SlADvXXIof7aBBSsSEZ054 moXFYv1Q8VESi+0o+EBcbkS7Pe4zUhOlKVy2dgo87eMXXISEnDzjodXsXKNuiI84 zRfFcPfjKUelg41vXYfRtqwpr82ClSja3xbcfEXi0mp6tpqZtM1hoB7roDUf7xck iKy9rlDsFtAnHtRVmTYUjO0LUjYpf3Fduk/ulKjXvKawfcRfSWfKQt17m7ADU97L qBEAiocb1NXx/96PECo2X6lEBQE+gJRQLqMnI5vxuIqIOt7P6znqYN+pc/JEnnQ6 qHM4Ka8M5ykklA== ---------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all your data!
URLs

http://dnpscnbaix6nkwvystl3yxglz7nteicqrou3t75tpcc5532cztc46qyd.onion/

https://www.coveware.com/blog/2019/7/15/ransomware-amounts-rise-3x-in-q2-as-ryuk-amp-sodinokibi-spread

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/74AE0237C84165E8

http://decoder.re/74AE0237C84165E8

Targets

    • Target

      7c8cb66e9e5ac66415273a48528e1b2f781003f2109b5d704254b9e91d745a34

    • Size

      122KB

    • MD5

      9ccb042cb5bbfba12d009ea0b5f1a660

    • SHA1

      9f8ef2e46e22f12c889a8644a2129202602feeaa

    • SHA256

      7c8cb66e9e5ac66415273a48528e1b2f781003f2109b5d704254b9e91d745a34

    • SHA512

      deef869719908687d9f63ffc2ba37c7ee340b5ce2ad9ecc3aba8849a2a5562904ddfa1bb4e1a0ad9f43944e6a198022496921f7f0658553ff5e37d815699fce4

    • Modifies Windows Firewall

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks