General

  • Target

    5583940856479744.zip

  • Size

    1.4MB

  • Sample

    211119-1g9a3aeff5

  • MD5

    3dbd0686d98164f0c48c38a1ef529637

  • SHA1

    2ce3be2dbb48a9a192419086884f0236bfbffb2f

  • SHA256

    ea13726399250935413444d0b7ed952064e970de7dc0cdca4fac7e0997245013

  • SHA512

    aed27cfe4e7e68a8f9de60907059f24d07f7f011bba717bb3b17e52adbef3fae5df8b1dc92288240db77f72adc92382b9e28dbc707b3e37e2f981bbdbf705f82

Malware Config

Extracted

Family

sodinokibi

Botnet

19

Campaign

29

C2

schluesseldienste-hannover.de

alpesiberie.com

bratek-immobilien.de

bcmets.info

log-barn.co.uk

diverfiestas.com.es

nexstagefinancial.com

mundo-pieces-auto.fr

marmarabasin.com

walterman.es

juergenblaetz.de

centuryvisionglobal.com

witraz.pl

aslog.fr

qandmmusiccenter.com

awag-blog.de

domilivefurniture.com

penumbuhrambutkeiskei.com

from02pro.com

teamsegeln.ch

Attributes
  • net

    true

  • pid

    19

  • prc

    mysql.exe

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} Extension name: {EXT} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    29

Extracted

Path

C:\odt\na36cj-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion na36cj. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/A6DA3643E50ACB3C 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/A6DA3643E50ACB3C Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: U2AFEOX/cdGH+iZcVpHSA+ZFzTk8XpfzH5XcASXJrbvzQSSr5YBerVEIdVguO0Hf O6mHGi0us5Ttr2tLWH8wZD/OWwEqufdSAP7Ce5JLGr6Y3doWzabcpO92wk1FJpz5 Y4wL7CK3XhpeRYDKaFxrg3okWVJZ/DxUCNZegFzwtpRX8vPwG4LZyRu4sD2TTVB9 Sl/fYR5GUjQe4drJSwFm9MKq5L+2g1T24SH8yFFKLOlIPSdygA5BvB7eC/stY1qN Bv0WyLZ+KASeL0tHdjsoyHNH9yGa+LfGLh7zQUmIYcqtJHbAPc3uPUj45CpM5kZ/ V+vIrBmiw687iWhJDeRx+eDO3ZxP3zeOHGL5BwEYheHgYjTxPLX20zUc0lf+XQz5 0DNMbVPpYGW9mshAhTFKPL3zwEY0ZLI65T0S37BtMmWA/5Sh7UnnHdtnOpV6rgyN PXPFpY7aPAsG8qca3ZUH7MBt+hOyuwNOoUxwL/AFRzN5NzDe6Am8G9N5mrRwpQzq r55w2fhh0iopB7s2JBNzQkCXffEpq8FhDfLa//Z34WStJDRouTFbEoY1M5dBho+u lmd9Xie7Y7GbMSUfVtndIfMUXi40NjIiA5iq6pB9IDEmpbnyQe9ReuOhTrzVD6Ry 2x7A3ke9oH1Tt1uiMQohLTvfcF/SO0nWk226dWSj1oEAVxobUcDwk/aXy5U9Uq5X jLFgUHu2W6I6/vv9l9+90IteRJd/xG4jTwX0hXqnzbt5Y1jb4uw9WmRKPheKWHxB h03cTpyscXeqj9IBERdi9HPaXrabABeOagG1N9xIRjRLhbATUoQKMLPnGeC0JCYG 0gNmcHhwrilsnfCA4kuubJV7548TllC7gXEih6/wqaeSISYNfdCqxJT+weL0/vaf 6atCk232Y1wiSYZ5akhNAaUbmVhs2oE3+X7kHh4m5NrnjvTieMu+MRdJ9oB1Yr9T 6dzEiWGTQFMD7Me4wAaWlGUn0IkPBpR3PsXqF9P3Ko7tAmC604D7E/u3PMTuL8SI OgGtT64qKAjsy059fFmV9blEJVI1/vR3DQEU/Knw2FZ7wXUyeQczqyq/AtubtDA7 yOOc5k8wNbEFsQ== Extension name: na36cj ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/A6DA3643E50ACB3C

http://decryptor.top/A6DA3643E50ACB3C

Targets

    • Target

      745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f

    • Size

      1.9MB

    • MD5

      6f0f0f10532bcc6abaf04afd99811e4b

    • SHA1

      97f2891294853ccf9693d487f4fe11eea0dcb9d7

    • SHA256

      745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f

    • SHA512

      41a80f301a47e39c5eda4e444418143a8b320c1876970c2d9054c4d2c6f584e944f2a6bf1fd61c9c2a028a746eaa7b85c907a91aabb3a726e3693d96f90e90c2

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

File Deletion

2
T1107

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Impact

Inhibit System Recovery

2
T1490

Defacement

1
T1491

Tasks