Resubmissions

23-08-2021 11:08

210823-27bwphazx2 10

09-07-2021 18:51

210709-vvmw9tdrye 10

General

  • Target

    5852113896505344.zip

  • Size

    78KB

  • Sample

    210709-vvmw9tdrye

  • MD5

    72849d325afd18c31d65167ec7bb75dd

  • SHA1

    5dc150de21048a1e5faa53998323dc7615692210

  • SHA256

    351e787278b28df006604f420f645f0399b3ad1617ab04d7dd681bef012b099e

  • SHA512

    8c671b6ac7b255f3c563741e246e1305bd641dfdd5c586858afd3fbb2da257b9dfaf948a43e1cee96bcf6b7bfa5e5dfa782ca426c10107cf20e218acd86875e2

Malware Config

Extracted

Family

sodinokibi

Botnet

$2a$12$n3J5GEq4RwN945sUvtRFxepb0YNmyIj0Uux0yB6N9eF6/GKUDyrEi

Campaign

8101

C2

botanicinnovations.com

socstrp.org

gasbarre.com

loprus.pl

vox-surveys.com

richard-felix.co.uk

rhinosfootballacademy.com

lynsayshepherd.co.uk

podsosnami.ru

nurturingwisdom.com

sevenadvertising.com

biortaggivaldelsa.com

carrybrands.nl

mirjamholleman.nl

autopfand24.de

carlosja.com

waynela.com

d2marketing.co.uk

charlesreger.com

dubscollective.com

Attributes
  • net

    true

  • pid

    $2a$12$n3J5GEq4RwN945sUvtRFxepb0YNmyIj0Uux0yB6N9eF6/GKUDyrEi

  • prc

    onenote

    firefox

    visio

    sqbcoreservice

    oracle

    tbirdconfig

    mspub

    excel

    ocssd

    agntsvc

    outlook

    infopath

    wordpad

    ocautoupds

    mydesktopqos

    isqlplussvc

    dbsnmp

    dbeng50

    powerpnt

    winword

    ocomm

    thebat

    thunderbird

    steam

    sql

    xfssvccon

    mydesktopservice

    msaccess

    synctime

    encsvc

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    8101

  • svc

    vss

    backup

    svc$

    mepocs

    memtas

    sql

    sophos

    veeam

Extracted

Path

C:\13qrw9-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 13qrw9. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/EA2D562048E6B94C 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/EA2D562048E6B94C Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: NeC0pNHGIsJHzDeG0zzQHvkTihp3ThZ4LGGeyDL/EXg1qlplpGmS3Gq5g1MZkEmh ylcba7rLYH38JqFVjDRLbZqkVEJW3twTVmxt0ueRdWkWYBTZNae+eobl3nEvJ24Y 3EB2bPFBjukgbnJYwgaKL7VoJcKK4YkOFK+nbqfDee/YNkFfRkaR+UuRgtgDXbIf 6ygr4EtEYCB4Y+a8Dn7WNarX0MmA6srNAvfB3UfIAhjnw+Oh+1IBw5+EJyq76yjw Gf2esChNaw6otou0rB3yDHDOemMTsxpfH3a2V9nIUbfWU0TovwILMO/+yTj2n9j/ sTXrXI4/F7bSzc/TS5gl1/tw6h1eumZMntZ7IEqTlpqpLt/JatP1N3GDDPsNGk14 QEF4Ti8Ynl7MaSMdwalOEGjtjZdFeJi28RRG7T8YGOD+kj0iJ0bGjUl0WFOJqSKe Z14PCQr4RnnBE+bvUJyampKwTPAU8FmjJG7dNAgSMRPa1D6ntJpUtHUhcv6pyhen qaR7AaXSenW/fpuLeEjoTI4Oej00FnqUoYe3rIDFqsQWDAqhWM20Nqf6Q1RdPENM O9LJvQ/NCrpTWAeoVCFgArj19Cy2Kk3lpwYQgeHpkXl2uGrT/DVfXApMJnDlbPv0 LAbRltFiBALwfdBI7eZVmZfQTIAxgrbPiZg5tsV8KQ3uEdiTMnDFM/Ouvuowaoi6 fQSBt0uZlam3AQ95Exk65aDG7kgxQpVRUL3KTpraZ8ggNYjAMJqBKwpvVyCtktoD 0Q7e6YTk50r1yNPNFDFRi5gDdeOQfPPr4qtocM85ToX+sxYhkHegT8ybiEi2237X eUHdoXAwaLw8By9DN7RhAwFErTqNAjPD7RLOMTpv118dv4hWxssbGNjI3bIvkdqp oRqaHIkZ3dqZTFkTdGRfPuUf/ryPEaSoJ1etJpKSjA7LWqOC/gJ/LMApcNEbO8kR kru1UAnbRNsB7605+Oy5Bu+PrsHl8udEWvvSTiLdWOdDqOPpqNPkRz8w606JlrJp 8sm8SwyRWoHgVY0EnADBMaNiiS2cQ8Amx8X4ZLpbKthW2F6g9kClRP+FS3bOypMi bjEE7cusJ6016kX9b5fdpWruT5n7IGkT5rd5RXXi8BUZmxFfqWvxAt0oVfVqH/ep YyvqFJMSUt55Oq4w+OHqoe1UO8lBzUf+DkiQHv0bpd4LwxtUYabMCg/sNiDjKcb0 fMJ0kkVxZSsz7OJsjDsoNHE8sPv7nlhwDahQBp48//0OFRGgee5D3pTyUqdc59xw RzApug1D ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/EA2D562048E6B94C

http://decoder.re/EA2D562048E6B94C

Targets

    • Target

      203e8db304a49ec45bb077154254d8209074ce0bbceede18c02de5cd27ed4e46

    • Size

      122KB

    • MD5

      75b7a0612a92dd0230ab84ca81e07e01

    • SHA1

      c459b33b46d4d08ea720a449422ff2253ad16a09

    • SHA256

      203e8db304a49ec45bb077154254d8209074ce0bbceede18c02de5cd27ed4e46

    • SHA512

      cd09cf413da8792373362abae9cc787524a7022ee28ab59d33aca4e5bddae14845658e24844b9d92ed46fa8038fc729ddb7fcd743d12dc01eb416e4b1af637bf

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Modifies Windows Firewall

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks