Resubmissions

06-07-2021 11:31

210706-kz5pwymc96 10

28-06-2021 09:15

210628-eqz3rdbh2n 10

General

  • Target

    5cc28cafd16e1e1405e49644154f63bc554e862dda22edab2552345e9d4a7e25.bin.sample

  • Size

    122KB

  • Sample

    210628-eqz3rdbh2n

  • MD5

    8332af66ca738dbb08789674932aad81

  • SHA1

    808968a7f54fb83865a76328630d8d33185de1ad

  • SHA256

    5cc28cafd16e1e1405e49644154f63bc554e862dda22edab2552345e9d4a7e25

  • SHA512

    2f7a3dce41b52459d1da86e68f3dfa867858c02ed918d43d5642f370c43ddca9c5aa7119e1aab8677b12e530664478d28ad111c47f2d4ca21f65f48f62f401d3

Malware Config

Extracted

Family

sodinokibi

Botnet

$2a$12$rRIDZ9UohMQGear1LGXwy.Ore0Q9g0z26bpadMJvk9VKn1/Vv3TNC

Campaign

8172

C2

mank.de

ventti.com.ar

jandaonline.com

fundaciongregal.org

manifestinglab.com

edrcreditservices.nl

pferdebiester.de

diversiapsicologia.es

iyahayki.nl

pomodori-pizzeria.de

partnertaxi.sk

101gowrie.com

finediningweek.pl

perbudget.com

withahmed.com

candyhouseusa.com

hiddencitysecrets.com.au

strandcampingdoonbeg.com

trapiantofue.it

pinkexcel.com

Attributes
  • net

    false

  • pid

    $2a$12$rRIDZ9UohMQGear1LGXwy.Ore0Q9g0z26bpadMJvk9VKn1/Vv3TNC

  • prc

    steam

    mydesktopqos

    oracle

    thebat

    infopath

    dbeng50

    excel

    mydesktopservice

    winword

    visio

    isqlplussvc

    ocomm

    wordpad

    tbirdconfig

    dbsnmp

    thunderbird

    outlook

    xfssvccon

    sqbcoreservice

    powerpnt

    msaccess

    firefox

    synctime

    onenote

    encsvc

    agntsvc

    sql

    ocautoupds

    ocssd

    mspub

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DON'T try to change files by yourself, DON'T use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    8172

  • svc

    veeam

    svc$

    backup

    mepocs

    sql

    sophos

    vss

    memtas

Extracted

Path

C:\s6hn84rrf5-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension s6hn84rrf5. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/4B801C3B64B5E6B9 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/4B801C3B64B5E6B9 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: NEllASyHDWhsbeenymJhjtRRIhXsCkG0acbB1hC91Fom6nWU23bcUgALu5TcpSmI wYQpKHoWbwJVfESpaDoqIQLuNpPQCWhMctSESevUKo/rVueRuFHjdCPaqOhE21my WYqA5397XZqjL8P31pfqoygREk+w73Lo4QtW3FzST8R9duLWZHibKhot/LJo/cMv ESthl4FEB3VVFCfaG+iXpncQsoMU2nidw/Zo6Xixz8URkM+zWUeXe/4fgkc6JxBw IsycG+7L17yKDooEL/SGhGHnKthXk20WpJrdzIvDfVWAD25aawchoMs3lY463pNr fgIkKysrYBWJexI26aIgfwmtbOc/YMbd+xlyJg/cJSbmsSIz5xyGJ97sHgfkW17R tQYMvNkjn6THk7xRBf7op3nh9oHYEtKHmAW3tkJt6mb9r323fe8cRe8+5kAihGo0 pYHzFHq0K3/Nj6Qhk8rBby9hIxy9UoDTakyALNil9Pg0uEorCMDgR1pAn2VDmbCk Rh+JIbf/fPzVHUlN/4Cx74gET+V1RuuBZUix2Fv+mMX0UW7jIjeeuQQaICovfbBq X6hZWPggXZCsjA7GDSF6JrVA12P60GQlxoPpBwtGPqT0SyGmgHFJ9SxioP1Td+fO g8pBSPW3DVxwZK2zc1gMIMOqXqf6QUxxaYbvJjhG9piyq6XA1suxZILD86hkyHz5 PYGAvZjM2FNF74Gdb8ACFToD6TV18Wt9lFg0kykZffpxeZdcig9APltfGd0TrY/A 63SYThv2Py8//rNhH+qRtGibykjv1zMzvf5eebvTCgs6p9HiErPS5XgqGFYEfE+u uVnW3q3c4uu9I1uOiNR6tvwRxd2S91gmjSmwEzMEPJ2XX/dwSQ/pW/pKYj1yL8kc 38nFTup5tS/6zV3CAR3pH5xwIkwEcNvZl2ZABHWaseOA2aXvnBJ8RLb/RuBlLiuZ RkdcIs9RP5etbu5lssIkqb6EcSAUK3z9uUD0nLQgSmobVnBiqxY/kb8zMo4YG1oi YuVoY88pZACGSORwEyC08fKkvIXwKTDfTT8RI54ilC8CxQjjVFFDCNHx0KMgvmnT xnJ/Q6KTxfNK91P+HkiPvTZNdImBf+t1DHKo0KUYjkG+o0Y0I4OJm+3hcw/OOaM6 9OpmqMfYePhTjv6Yyl3zmhlQMDp7cY1xUAljL1XprObOnW7qwlRfzZHDFwiO8aZq +E70wHj66j3WJbE3Gs4Dtzw25sZVIIjN4AkzGmee9My5E+kqHTpHz11pTLoZhXMd Byw9Z11mx5C59zbp8yg= ----------------------------------------------------------------------------------------- !!! DANGER !!! DON'T try to change files by yourself, DON'T use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/4B801C3B64B5E6B9

http://decoder.re/4B801C3B64B5E6B9

Targets

    • Target

      5cc28cafd16e1e1405e49644154f63bc554e862dda22edab2552345e9d4a7e25.bin.sample

    • Size

      122KB

    • MD5

      8332af66ca738dbb08789674932aad81

    • SHA1

      808968a7f54fb83865a76328630d8d33185de1ad

    • SHA256

      5cc28cafd16e1e1405e49644154f63bc554e862dda22edab2552345e9d4a7e25

    • SHA512

      2f7a3dce41b52459d1da86e68f3dfa867858c02ed918d43d5642f370c43ddca9c5aa7119e1aab8677b12e530664478d28ad111c47f2d4ca21f65f48f62f401d3

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Modifies Windows Firewall

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks