General

  • Target

    de08a0f001ecbb0303511d29807c419d770e383c76bf7f83e2cb12365af0bfca

  • Size

    115KB

  • Sample

    220124-a8emnahabn

  • MD5

    f3872a3c4750812c4bbcf48f8df1e294

  • SHA1

    454ecb3f4ef05e5ef8009465133d5db5eeab61d2

  • SHA256

    de08a0f001ecbb0303511d29807c419d770e383c76bf7f83e2cb12365af0bfca

  • SHA512

    7ff9fc5b29cc8525a0381de26143defde4822a5163aae50ca03b6f05a51875f4ac19eb2720a8ceb6def3026472b518ee72db3e15016e3cadc52743d1999cadc2

Malware Config

Extracted

Family

sodinokibi

Botnet

$2a$10$K3e/8U5kTf1SeeP59ySDm.Nu/ZOPmvs.5wRO81mm/2KTdJOpjWjNC

Campaign

4675

C2

delawarecorporatelaw.com

bildungsunderlebnis.haus

ihr-news.jp

stefanpasch.me

visiativ-industry.fr

effortlesspromo.com

minipara.com

tomoiyuma.com

selfoutlet.com

ino-professional.ru

corona-handles.com

shhealthlaw.com

kindersitze-vergleich.de

bee4win.com

finediningweek.pl

freie-gewerkschaften.de

noesis.tech

parkstreetauto.net

karacaoglu.nl

muamuadolls.com

Attributes
  • net

    false

  • pid

    $2a$10$K3e/8U5kTf1SeeP59ySDm.Nu/ZOPmvs.5wRO81mm/2KTdJOpjWjNC

  • prc

    infopath

    outlook

    steam

    mspub

    tbirdconfig

    xfssvccon

    firefox

    thebat

    sql

    isqlplussvc

    sqbcoreservice

    mydesktopservice

    agntsvc

    dbeng50

    wordpad

    oracle

    onenote

    msaccess

    ocomm

    encsvc

    mydesktopqos

    winword

    powerpnt

    ocssd

    dbsnmp

    thunderbird

    synctime

    visio

    excel

    ocautoupds

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] WE DOWNLOADED YOUR DATA AND READY TO PUBLISH IN PUBLIC ACCESS IF YOU NOT CONTACT US[+] (USE TOR BROWSER) http://dnpscnbaix6nkwvystl3yxglz7nteicqrou3t75tpcc5532cztc46qyd.onion/posts/95?s=5217f460ed11f8ad24cd554955668a2d [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    4675

  • svc

    vss

    memtas

    sophos

    svc$

    veeam

    backup

    sql

    mepocs

Targets

    • Target

      de08a0f001ecbb0303511d29807c419d770e383c76bf7f83e2cb12365af0bfca

    • Size

      115KB

    • MD5

      f3872a3c4750812c4bbcf48f8df1e294

    • SHA1

      454ecb3f4ef05e5ef8009465133d5db5eeab61d2

    • SHA256

      de08a0f001ecbb0303511d29807c419d770e383c76bf7f83e2cb12365af0bfca

    • SHA512

      7ff9fc5b29cc8525a0381de26143defde4822a5163aae50ca03b6f05a51875f4ac19eb2720a8ceb6def3026472b518ee72db3e15016e3cadc52743d1999cadc2

    Score
    6/10
    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks