General

  • Target

    ee0a18f121ccf96b1a346f5c6b4c69e735dea57b3f45977a139135d177b266b8

  • Size

    116KB

  • Sample

    220124-a365qaghcp

  • MD5

    3b8877a1cca8ca727856882896582fb0

  • SHA1

    0cf90549ce3048f94ee64b9e11e17504c56a7e07

  • SHA256

    ee0a18f121ccf96b1a346f5c6b4c69e735dea57b3f45977a139135d177b266b8

  • SHA512

    5488799fb6ec60e10bb4cb6e7afb4f49522ccc4e4b1e172d0675369b24f9cb118059654f0bc07f79871f613a4759c2c796e040dd896e4af9083c58a6c374483f

Malware Config

Extracted

Family

sodinokibi

Botnet

$2a$10$/Ym08dpRCrA6o3QyBBR1jOAfdUf6N308AqKRjVcemY8hVDFzkn1JK

Campaign

4953

C2

dnepr-beskid.com.ua

insidegarage.pl

evergreen-fishing.com

rebeccarisher.com

lascuola.nl

comparatif-lave-linge.fr

mylolis.com

kostenlose-webcams.com

backstreetpub.com

bargningavesta.se

theduke.de

tomoiyuma.com

extensionmaison.info

highlinesouthasc.com

cheminpsy.fr

tux-espacios.com

nurturingwisdom.com

harveybp.com

creamery201.com

juneauopioidworkgroup.org

Attributes
  • net

    false

  • pid

    $2a$10$/Ym08dpRCrA6o3QyBBR1jOAfdUf6N308AqKRjVcemY8hVDFzkn1JK

  • prc

    CVMountd

    SAP

    tv_w32.exe

    excel

    EnterpriseClient

    tv_x64.exe

    xfssvccon

    mydesktopservice

    QBCFMonitorService

    thebat

    tbirdconfig

    bengien

    sql

    VeeamNFSSvc

    beserver

    sapstartsrv

    vxmon

    mydesktopqos

    TeamViewer_Service.exe

    powerpnt

    ocomm

    VeeamTransportSvc

    saphostexec

    dbsnmp

    dbeng50

    TeamViewer.exe

    steam

    cvfwd

    avscc

    VeeamDeploymentSvc

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). The faster you contact us, the easier it will be for us to agree. Your backups were also encrypted and removed. [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!! ----------------------------------------------------------------------------------------- You can read about us on Google: Revil/Sodinokibi - Travelex, CyrusOne, Synoptek, etc.

  • sub

    4953

  • svc

    SAP

    MSExchange

    SAPService

    MSSQL

    SAPHostExec

    AcronisAgent

    SAPD$

    GxFWD

    bedbg

    avbackup

    MSExchange$

    svc$

    QBIDPService

    stc_raw_agent

    veeam

    BackupExecVSSProvider

    BackupExecRPCService

    GxVssHWProv

    GxBlr

    SAPHostControl

    ARSM

    GXMMM

    VSNAPVSS

    PDVFSService

    SAP$

    backup

    BackupExecDiveciMediaService

    CASAD2DWebSvc

    QBDBMgrN

    memtas

Targets

    • Target

      ee0a18f121ccf96b1a346f5c6b4c69e735dea57b3f45977a139135d177b266b8

    • Size

      116KB

    • MD5

      3b8877a1cca8ca727856882896582fb0

    • SHA1

      0cf90549ce3048f94ee64b9e11e17504c56a7e07

    • SHA256

      ee0a18f121ccf96b1a346f5c6b4c69e735dea57b3f45977a139135d177b266b8

    • SHA512

      5488799fb6ec60e10bb4cb6e7afb4f49522ccc4e4b1e172d0675369b24f9cb118059654f0bc07f79871f613a4759c2c796e040dd896e4af9083c58a6c374483f

    Score
    6/10
    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks