General

  • Target

    656dfd8f4518a3534e8f399f64ada874014c05a59daae1c98ab9c67fe87a4e15

  • Size

    143KB

  • Sample

    211028-sh9zzsgefk

  • MD5

    42ad5580068c28dde500d23db5a197bf

  • SHA1

    7c0bdac160d81fd210b7b50208d6b7bb7b86fac3

  • SHA256

    656dfd8f4518a3534e8f399f64ada874014c05a59daae1c98ab9c67fe87a4e15

  • SHA512

    18f5607b908d8109df1575591028bcf7a0bd65e6946f186147f5327e55959b8bfebb476dc8549d81632944cc686c3be1035ddf7c8ce5c74b13032e60aa555960

Malware Config

Extracted

Family

sodinokibi

Botnet

$2a$10$i4Qf7geFCZ7lWOdqqwWhheHJ42u0kNQeWmIjHYGkdN1NhIwuCa2va

Campaign

1428

C2

ecpmedia.vn

triactis.com

promalaga.es

siliconbeach-realestate.com

bigbaguettes.eu

web.ion.ag

spacecitysisters.org

abogadosaccidentetraficosevilla.es

blacksirius.de

sipstroysochi.ru

foryourhealth.live

schraven.de

mardenherefordshire-pc.gov.uk

pubweb.carnet.hr

joyeriaorindia.com

makeflowers.ru

seevilla-dr-sturm.at

podsosnami.ru

stupbratt.no

jsfg.com

Attributes
  • net

    true

  • pid

    $2a$10$i4Qf7geFCZ7lWOdqqwWhheHJ42u0kNQeWmIjHYGkdN1NhIwuCa2va

  • prc

    sqlservr

    excel

    sqbcoreservice

    powerpnt

    mydesktopservice

    dbsnmp

    msftesql

    steam

    sqlbrowser

    ocautoupds

    visio

    sqlagent

    thebat64

    outlook

    dbeng50

    mydesktopqos

    onenote

    sqlwriter

    tbirdconfig

    agntsvc

    infopath

    encsvc

    oracle

    synctime

    mysqld_nt

    thebat

    xfssvccon

    isqlplussvc

    wordpad

    mspub

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} Extension name: {EXT} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    1428

  • svc

    memtas

    veeam

    sophos

    vss

    svc$

    sql

    mepocs

    backup

Extracted

Path

C:\365vg0f24-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion 365vg0f24. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/995B11B40B68F6FB 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/995B11B40B68F6FB Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: 0wHHMQR56z8vyVuX+bG35hrHPx2bXPfJHta5I9jM7t/631Z/VerTOvzJoAqMB17V ACjlOLkwLsj9nSLSy8X0uHHee9AO2cgEO6qBWG/JrID8gbQJi0DExRmb3fy8IZ5r smliEN0HVIRm8PjFC+gJkWQh6+41AOEwlWF/ssBUUicvFEnY63PDSskDZ0dBgww4 H3UsHqALBxhF0U9U2srw8Wsx73uPCUVFZEL80Fcvq4ZP0ihMvIydos1ECjXicT22 tR8tt78bCwUn/2PFgTxotu+edhvQeohAleILf7AIiaWHO6n2g7X3t0TkadBIGaY+ C0mt7XMZ4fBBX4zXJ89VyKRPM8Z3i0+pbHM8oCv9DHbTwFjHUt1Y8uLxycvjJcKh 9yh5M8kVWy3SB4rqNgETQYUkOVJeCcplUPArm/Ow7aFQYh3zK1CY/ue/ACsP/eYa Ec3jZxTom2cFh+uVB96G6iOtLXE/JcDb2XJ3rxl1PKzVjDHvLsJ5QmxqIxHFyBtX GetUEek+XsoRJ+6DzA40YYjWny0OBK8O9/9EvJymPY5v1mcMr6LdoOdKyil0F8qh uCQkVfOK5FQPmmAuxBtDa5pTiMa2wWlpOcKnsiM+6K1jifl+Ow4dj8T58Ur9BHAH lW8a/+dUPIy+jNteUiqzhBNmT6YXHCoYP4q+HBK8eo0rhNTncooHyBZBmlpPGUY2 VTZlM05VwH2ILTU3sQnFnBcY2o1WgFmVvEdfLqJJEkVxFXAIayUqevVne0/vZ1ZS S9DvZbbusq9FqpFByawT90Cib23ClurKIlgp1dViYMuldukEPiCP2fbjhClWLMSx g0ECmhwYXLP9OTR1nGo9JPCX9DyzS1bPcBlNu4bVoeZhK6FtPK1Whf5TGf39ZYNq zO4lskfTQS5HWPU2m85UR32laIgX2frsikOTHKsPXXB6Tf+gfXxFLwUTXT4wpZsN qeEZo8llzjeOrGPBICJPr0eIeYN3xjZgAyilwlnxS6uBmAsEQkHYlh8oiuo5xMt4 B0zPlMSP26DjvZtNgn8bcrUJmJRREDdNskbB17wIq9L7E0oT1eiBwHZG9yHOwPMJ oVYu2S+hobKkE/4+seMkmqTPOhwND2Bw0eJhQ7RVYb+8aM5AOyPLU3KhIh1Nfgpe gokXLMbBSsTYUIDgSQ1O5QB+nmPJ+SbihBACpUkouIwErcCmm+mEVKczf5w2HJcR fWSzBdNXhLl0bslsodQtrTJXldElJweNdiGIw7DNS+DJzPUmmdnstcNHBOi91S53 qzB2RaSqc4BPCjsTTwsq+z4D3rdHLw== Extension name: 365vg0f24 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/995B11B40B68F6FB

http://decryptor.cc/995B11B40B68F6FB

Targets

    • Target

      656dfd8f4518a3534e8f399f64ada874014c05a59daae1c98ab9c67fe87a4e15

    • Size

      143KB

    • MD5

      42ad5580068c28dde500d23db5a197bf

    • SHA1

      7c0bdac160d81fd210b7b50208d6b7bb7b86fac3

    • SHA256

      656dfd8f4518a3534e8f399f64ada874014c05a59daae1c98ab9c67fe87a4e15

    • SHA512

      18f5607b908d8109df1575591028bcf7a0bd65e6946f186147f5327e55959b8bfebb476dc8549d81632944cc686c3be1035ddf7c8ce5c74b13032e60aa555960

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks