General

  • Target

    ed70847aeee2bd0df8f5787c4f580bf7b8e46d7f46b8f6e2bf082c4014c90261

  • Size

    116KB

  • Sample

    220124-a4ag5sghcr

  • MD5

    64cf38b177bd1da0e273d65643b38b38

  • SHA1

    68befa14bf6358cd2c43f7e9583dea73e115d745

  • SHA256

    ed70847aeee2bd0df8f5787c4f580bf7b8e46d7f46b8f6e2bf082c4014c90261

  • SHA512

    1eaf6dbbd78c5088112cbb77433f7bb76a02a5761acf06eca2ed93248da369df71a1ab6aee34246054d60eb6605697e1d487d6e4b92c40785a7bb7226063d047

Malware Config

Extracted

Family

sodinokibi

Botnet

$2a$10$VJJOkbFRTjP7v8lzW9.sgeRSEw8nwVi2bnRRfUm7RoUzoUHHGFs/6

Campaign

5165

C2

austinlchurch.com

maureenbreezedancetheater.org

cuppacap.com

mepavex.nl

autopfand24.de

oldschoolfun.net

pivoineetc.fr

moveonnews.com

latestmodsapks.com

anybookreader.de

girlillamarketing.com

alfa-stroy72.com

heidelbergartstudio.gallery

datacenters-in-europe.com

commercialboatbuilding.com

ccpbroadband.com

penco.ie

stacyloeb.com

lbcframingelectrical.com

boisehosting.net

Attributes
  • net

    false

  • pid

    $2a$10$VJJOkbFRTjP7v8lzW9.sgeRSEw8nwVi2bnRRfUm7RoUzoUHHGFs/6

  • prc

    msaccess

    mydesktopservice

    ocautoupds

    infopath

    isqlplussvc

    onenote

    mspub

    thunderbird

    powerpnt

    winword

    sql

    agntsvc

    tbirdconfig

    wordpad

    thebat

    oracle

    mydesktopqos

    visio

    steam

    ocssd

    excel

    outlook

    ocomm

    dbeng50

    xfssvccon

    dbsnmp

    firefox

    encsvc

    synctime

    sqbcoreservice

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions The final price depends on how fast you write to us. We also have gathered your sensitive data. We would share it in case you refuse to pay.

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). We have copied financial files and other important information about personal data, it will be published on the Internet or will be used against you if you do not pay us, so if you do not want such consequences as customer churn, media coverage, fines like GDRP and other damages, we recommend you to contact us and pay the ransom. [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    5165

  • svc

    sophos

    svc$

    sql

    memtas

    mepocs

    vss

    backup

    veeam

Targets

    • Target

      ed70847aeee2bd0df8f5787c4f580bf7b8e46d7f46b8f6e2bf082c4014c90261

    • Size

      116KB

    • MD5

      64cf38b177bd1da0e273d65643b38b38

    • SHA1

      68befa14bf6358cd2c43f7e9583dea73e115d745

    • SHA256

      ed70847aeee2bd0df8f5787c4f580bf7b8e46d7f46b8f6e2bf082c4014c90261

    • SHA512

      1eaf6dbbd78c5088112cbb77433f7bb76a02a5761acf06eca2ed93248da369df71a1ab6aee34246054d60eb6605697e1d487d6e4b92c40785a7bb7226063d047

    Score
    6/10
    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks