General

  • Target

    8e03f92cc147e865d6e3ca6296e84683e13993e47af6203d8fcb3927c968c7f3

  • Size

    164KB

  • Sample

    220124-b1jr3shga5

  • MD5

    0648162d538cefee7c4548778de06399

  • SHA1

    c47f9bc817059f7bbd9e65533b86f41061831898

  • SHA256

    8e03f92cc147e865d6e3ca6296e84683e13993e47af6203d8fcb3927c968c7f3

  • SHA512

    c1e3f38d05b433efa5c189acc3dbb8c1264d5cb960903e2eee570a1bc6ba952669e147628db2ee0a3948e8bc844376f7a66b8775baf619eda5e80995e5984cfe

Score
10/10

Malware Config

Extracted

Family

sodinokibi

Botnet

28

Campaign

1411

C2

voetbalhoogeveen.nl

alpesiberie.com

cascinarosa33.it

slotspinner.com

signededenroth.dk

qandmmusiccenter.com

startuplive.org

nrgvalue.com

publicompserver.de

nationnewsroom.com

istantidigitali.com

spirello.nl

dinedrinkdetroit.com

parksideseniorliving.net

keuken-prijs.nl

levelseven.be

ninjaki.com

osn.ro

prometeyagro.com.ua

atma.nl

Attributes
  • net

    true

  • pid

    28

  • prc

    ocssd

    mydesktopservice

    firefox

    sqbcoreservice

    thebat

    infopath

    synctime

    winword

    encsvc

    powerpnt

    mspub

    dbeng50

    visio

    mydesktopqos

    xfssvccon

    excel

    dbsnmp

    oracle

    wordpa

    ocomm

    steam

    isqlplussvc

    tbirdconfig

    onenote

    outlook

    ocautoupds

    msaccess

    thunderbird

    sql

    agntsvc

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}_Wannadie.txt and follow instructions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} Extension name: {EXT} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    1411

  • svc

    sophos

    sql

    svc$

    backup

    mepocs

    veeam

    vss

    memtas

Targets

    • Target

      8e03f92cc147e865d6e3ca6296e84683e13993e47af6203d8fcb3927c968c7f3

    • Size

      164KB

    • MD5

      0648162d538cefee7c4548778de06399

    • SHA1

      c47f9bc817059f7bbd9e65533b86f41061831898

    • SHA256

      8e03f92cc147e865d6e3ca6296e84683e13993e47af6203d8fcb3927c968c7f3

    • SHA512

      c1e3f38d05b433efa5c189acc3dbb8c1264d5cb960903e2eee570a1bc6ba952669e147628db2ee0a3948e8bc844376f7a66b8775baf619eda5e80995e5984cfe

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks