General

  • Target

    44cd22cb40115a504bf933ec006d47ae0076f450f76b54783f846beca81c4c93

  • Size

    122KB

  • Sample

    210617-p7t6zxffre

  • MD5

    84645b3639932f0ca17d8e13c17dff87

  • SHA1

    4435d46fa99b53cc986f16e41dd68823a77161ab

  • SHA256

    44cd22cb40115a504bf933ec006d47ae0076f450f76b54783f846beca81c4c93

  • SHA512

    5e4039974929fefaa43dc5d2e396bbaf1f4d88c8cfaa477b7705295cd310676f46d5ed17f1a6451e2040b93513654ab6303fcce2cceca1f7b4ee4340e2ce5eb3

Malware Config

Extracted

Family

sodinokibi

Botnet

$2a$12$AJHD/OA.DRawIcpMsNUxDuDFzZ2jtvKVsPCK8SSbjYZSijT9kiAVi

Campaign

7820

C2

zonamovie21.net

milltimber.aberdeen.sch.uk

theletter.company

dr-seleznev.com

caribbeansunpoker.com

hokagestore.com

theclubms.com

kamahouse.net

sarbatkhalsafoundation.org

harveybp.com

blacksirius.de

ecpmedia.vn

lapinlviasennus.fi

spinheal.ru

no-plans.com

smokeysstoves.com

centuryrs.com

adoptioperheet.fi

physiofischer.de

mirjamholleman.nl

Attributes
  • net

    true

  • pid

    $2a$12$AJHD/OA.DRawIcpMsNUxDuDFzZ2jtvKVsPCK8SSbjYZSijT9kiAVi

  • prc

    oracle

    msaccess

    synctime

    mspub

    excel

    xfssvccon

    ocssd

    thunderbird

    mydesktopqos

    powerpnt

    steam

    thebat

    isqlplussvc

    dbeng50

    mydesktopservice

    ocautoupds

    onenote

    outlook

    visio

    infopath

    wordpad

    sql

    firefox

    dbsnmp

    ocomm

    winword

    tbirdconfig

    encsvc

    agntsvc

    sqbcoreservice

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- We will use the data gathered from your systems in future campaigns in 14 days !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    7820

  • svc

    backup

    sophos

    sql

    memtas

    mepocs

    veeam

    vss

    svc$

Extracted

Path

C:\v344qf-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension v344qf. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/87D75C1EFBD143A5 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/87D75C1EFBD143A5 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: s+ota16xP1FSnzoLEjf5QJHG1khAdD0BQ9drakap0WV6Kc6aRrNsylAkF1HKiw3J BbW7+6NeisGR4gAW/YREpHpj7go49Gmvs3sk3mBj0nEHMWYZT3uDyFpawT7sxO5Q cFaUnOZjZzVBWDagDvdvInZfah5vJotNIlHW9KYAUSXaZTqFUkw06Sus+mBlDIWX Lgj6XsQbfTQLckN2YHkw6WwdlZfWlG24IF0FXonGjYBJHzGEI6qcAaR9I15bEznq 3OydzxLY1wb6EIslzIUM46w9fvSJGZCGKfMBiddRdQYTIgBF4hwib/5REryZ8zkN RUJCRkCZNnpnVyMi2du7Lb93XqI3tHmfxWb+8PxaqsTRbz4yvmdXBHMumFyiFdXO 2yxdaaZtT5mOsi6M0HDA9G1FoZaj5C6n9eW/KvxZqMn881NTL3C5ai7x9n1op5rd Nso7ltisiYl9XP/kVQN6zipAZdBCGMd8j084GH4lCcOz+64+DSC+zrDcOj+ofI9+ syevrRXTJBCSfORjb+ZPyWIsTQChVxnrgl5LZ7pVJdngee+aH0nZ7oobkpdkZZKV zhQVmx0q9g+eQx8EB/2JOM9emON+hCmNFdV8g9W8spnYs+4RAVAU80Wvh5C0jhzU Yfl61dpZwbGszY5zX561aTQvt0Ry226r+90mfKYMdsuKJAItJTjGd32S3bkBLAor Ahcr6wO1332vsEtGGiNleDCEWFIK7YHh9AiOqcP8naW/iCl11L/G7f8mvMsiZKaD fd3nhx1ddOYKG32o3st8Dlt9MRImVhOu9euNYPL3KYRcYcwgd9v3cxD2+NgF7YLH VREXIqiwaKHUszrEZ6UwmqZ8V9PH9PQpyNYfMFVvkVV/TaidHoXz7g1mi1LLxeqF uTihZCW9ZXsO3ZLTneZH7oG4hNFQvKnYMH5xwfGHShg5DIUc7Fa3H+X9p6RrIc1+ sKDiSfnljPL7AWDlwZctD5VH1UFypaLA3sEoNiO0JQD2j+vHT9Yn8EJxtjBwoYte iEuqSRCjoEOYKUrEjBW2+cCKnuk31KrnBUjCAhUyqErAIwjofMVUF3s/vozscEn1 +iyRN3LU8HBqJkUbbmHOlH4V3R9Tf4Ir2c6tlUdZ51DaGC+zn4V8yCjK3EoFKPNn gSh7/tZQK2zjXcgikafyhilVmCGdQXF/RjGmdXXZBGVAOL958biBLI4DnI+LOndA QZA1WxVy6zen84eW1x0aUi2Skz3eTZWMIf4Oh0FhFjVPOAA//XBqSFlOA00wCRDZ 8pix6177 ----------------------------------------------------------------------------------------- We will use the data gathered from your systems in future campaigns in 14 days !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/87D75C1EFBD143A5

http://decoder.re/87D75C1EFBD143A5

Targets

    • Target

      44cd22cb40115a504bf933ec006d47ae0076f450f76b54783f846beca81c4c93

    • Size

      122KB

    • MD5

      84645b3639932f0ca17d8e13c17dff87

    • SHA1

      4435d46fa99b53cc986f16e41dd68823a77161ab

    • SHA256

      44cd22cb40115a504bf933ec006d47ae0076f450f76b54783f846beca81c4c93

    • SHA512

      5e4039974929fefaa43dc5d2e396bbaf1f4d88c8cfaa477b7705295cd310676f46d5ed17f1a6451e2040b93513654ab6303fcce2cceca1f7b4ee4340e2ce5eb3

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Modifies Windows Firewall

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks