General

  • Target

    843c781fa1d426f2112e53367ea18dbddb41b7d8b243519c3bb47d16256064e0

  • Size

    207KB

  • Sample

    220124-b4csyahgd6

  • MD5

    d9f89f4c741bb2bd29f0a375962b838e

  • SHA1

    9d314af0037bfa0ae8fee3cdc1454796de7476ae

  • SHA256

    843c781fa1d426f2112e53367ea18dbddb41b7d8b243519c3bb47d16256064e0

  • SHA512

    8d5b1a30b4a79ab8f44266c01e815688a336aac27bb5db8d14e3b18fdb299a9dde8c3d0eeeea1e04faa9925e25790159c50e5311e1d68189f84775ef52bc20cd

Malware Config

Extracted

Path

C:\dxm16gd30-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion dxm16gd30. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/5C81357DCD1930BD 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/5C81357DCD1930BD Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: WrXBflGDY9fhXynkemJhlOZheVj/VRPIkSdMimimzLQK4wU0Xs7Bw+1gTqoKIn59 JgX+Vh3GwCC2SDL21zbokp3fkqk1qdAgl+7kMktWTvW6rUDvKO9mIRQ6DJQson/O Zey+QKPLjI5RlB6688shUOI5bgu7f2CDz/s5idKTxqygn4QAI4nWgKQBMW1RzJ1v JzscZwjoJSTVwMRqVAN9zzH/hQh8DrlMRJEwnaZ4hmU/Nlu12pe0vOLA6AODDjBh vi6PdgImSqqvidDxlHcgU4Q0UJhp8Vx+dxFQn10O2BUlPL+PkhSMMl2vEoVqClXk AM0tSSRlwLjVeYF2XXpVBBiDVOxYqazPNOp3xIcydmnkVojrv3MYRyHMRqHyogm3 uOsOYr2rh37Upim8b7XRUMPGigOtN+rXqfb9ZQnCOq6jcbo36xra/Aq8Y2uKB4Dv hX/jDS13ks8C1bG5EMitm1c6wSpCs4iIerbtYH9bzJYlEsxuklO0HWCJFj7mY4XR JYsq4OIBw7XVmK5ZVj6E6Rd6Ah67tZNCowC12v45nlwbg2ylZapltzF9aQaGclzt /fXzTQMdPS1TE64PrVcMVkmuvErWya3t9wWXYG7M2AE0XyuhnN/CKT6i8zOsRwEe b8YiioWKJ5pP+TusEnrk7XeXB6bSt6hz4Mn6Z6cDPPllfjXZA5phtO8H8Gg8DZz2 XR2pdIwR+3jmTeAbsDPd3OYcA77ULbyvNz/S/AMn3sSvAsvsJhNxrE3Fwr9H5CTT bjRzTkoE6jXzqFo455g/CGP4r0EBTZs71u5RGxDK13+Q3ECuX/cdHqgbUuMhkoph vIizs3N7EF5VEjHZTaKFcfnrZczTGx6+UjoQnTGjEI8BS302RG8Laq/UuvfZJ2tW YPGMKzvGmM1+JQM27tBjxlluryF0Pn/Fyh4JpRrOuDIYfXJ5JJCzZtKCxRBkFTF9 19Et1wQNADPC/2qcHWxY0PMakKMuzbHUBhG+v1OZ8KIljLEQE7/WUV8ArLdtm/UC /WJMrPYP0wfPAzoNWxNnRN7cyCxADM2bJlxUIyjyBlDVuacff4ZK/yRm/HSSuZO4 ElEbG7YJbW40ukR594Vnz5ncXaUfFvRRybZ4y1bOi3kG/53wjbxZ5nQ73SBZV2DE VMjzSxxg+A2YG09jfEY8xL7Q3u900LdfXHmlM5sSFNsAGNr0JLsoCUoqpi5mpBpd fr6IdVt/qjZXnGsLM3/D0Kw6GTbYQQI13I7iSWY3vZH3OQDYw88QtkY9TBGyLJol U0aMldJRagLaa9w4O9iLjsCZaRedly72InXZFLqR Extension name: dxm16gd30 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/5C81357DCD1930BD

http://decryptor.cc/5C81357DCD1930BD

Extracted

Family

sodinokibi

Botnet

$2a$10$68XDJqNysd88BgVGYrJ7PO1MhEgkwxGhBfpAuTPWzBbc53gtZZK62

Campaign

1428

C2

marathonerpaolo.com

danubecloud.com

dirittosanitario.biz

1kbk.com.ua

moveonnews.com

bestbet.com

projetlyonturin.fr

www1.proresult.no

musictreehouse.net

ligiercenter-sachsen.de

effortlesspromo.com

theduke.de

xn--fn-kka.no

artallnightdc.com

celeclub.org

xn--thucmctc-13a1357egba.com

schmalhorst.de

carlosja.com

renergysolution.com

cleliaekiko.online

Attributes
  • net

    true

  • pid

    $2a$10$68XDJqNysd88BgVGYrJ7PO1MhEgkwxGhBfpAuTPWzBbc53gtZZK62

  • prc

    thebat64

    mydesktopqos

    winword

    outlook

    infopath

    dbsnmp

    mysqld_nt

    synctime

    mysqld_opt

    mspub

    ocssd

    steam

    thunderbird

    msaccess

    sqlwriter

    excel

    msftesql

    agntsvc

    sqlbrowser

    encsvc

    thebat

    firefoxconfig

    wordpad

    onenote

    visio

    sqlagent

    dbeng50

    sqbcoreservice

    ocomm

    isqlplussvc

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} Extension name: {EXT} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    1428

  • svc

    svc$

    vss

    sql

    memtas

    backup

    mepocs

    veeam

    sophos

Extracted

Path

C:\g73ndx739-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion g73ndx739. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/37CA594BBE0E22B7 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/37CA594BBE0E22B7 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: /9OlTGfJfdMhtKG7h0WfPozuHVBbva2FW1Q12jDh/D3ipYCP0IYC0oi0MJDU5iBi jgDfmtgrrZkID7P2OOa7YW+conX3jSVt8RNihCDu7HUdnskoAZDvvxZlc8bZDnbW dPM5JRcH1RwxnFIsi2uPX5YDDPdFKG6zO0SVwckxRq6Dx7ZevtI8ImFSAAjQ7JrG 4MUizMPFOzZFLdmqwYDyTznTq6xUDojd81PzTi0j6+Fo3U3VePVFJzwXJn5RK6TY XV8ljY02RpKh/RCH9fKIUpHRBFzOO7QynAeEUxjglR6lg1+En2QBMmqUVOJGzBzp E7NElTHAgPJmaHCvr1tshMuogwQxP400NANaQxu7/XvlCBSkPUJhzRXN/wJWM4bt r5XfJGIT6RtMDjePykoLGur/aDzTNAUvrFOp6maM2yxHStFWCmXH8ATMqwBUrc7G intYpXpQFdzopK0eyNst9NjImSz78HOlFe4q+LcUTH5nVy/VQ5Jh6baNOeD7kdr2 wx9aA8eeXTepfMiEd9JZQLtUYtomS4dGzOzAvF92aywsu/wD6ZH4Whojy85X6utw yWO27ajd+Qo1hgHM0Bl5H/D5LzsWIqufF0iVmWz/4Vsz9PrPe5DGTUg3YEUM9aUx QIU4PLvRbFfByV4+8S77aKhJrbG6mvplGRuwquQQMA0JvLkxO27DBXmofeyY4UkG M/RRzzsjm7MtFIN83btzLwKaR5eMMI6BboK87s4rT7WW+LBxJfmmOPfbpCQgd6GM FySC+IxnHUsgD/8siLqX8NWISbe6M+LV73wVHvpzFdVVNdJo8XhJTPd7Dgq1BgoX zOFq8RWJgHWEKN4kk+QbOqcARAca6jbEh3xKq1GJejB8g/VLllMxnW6+z/ID/9F5 lqeXMBXAc+63D10+/oF09VIxRlG7h0V68elqPoUnqgof+L6E5VmBGdfsdbU6TWDi sKTBaukWB4S7AlkHPVAVR5naSQf7wqJObu5EEkCbGZvUovdFiyCs5ZAUbYv+HtLD 7Dwy8C0PvQ6Op5DNId3sdilneYredh8vkJWPuEer2egg1O6Hl+OpeLjQDdv1PqP2 iJKya4sLjrEtJPl9uT+yP0uwQzSvPzuOwdNdfd3lidhyY6p1EsujAIrUXyJkfwxm DfDc8a15Nju+Ol3m0dgqJppsSTLIS27IDg3egQOAve7n8fqLb7J89DvB6gpGT/Id e3SjzWh/BdKXnWdW4qOVile9rllJFOJFMDsE5Y9erCQqFOTv+Cn5giOFQMLZ6O9s 0B31fN0qXE3XQkwMyyv2O1jn6iucfA== Extension name: g73ndx739 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/37CA594BBE0E22B7

http://decryptor.cc/37CA594BBE0E22B7

Targets

    • Target

      843c781fa1d426f2112e53367ea18dbddb41b7d8b243519c3bb47d16256064e0

    • Size

      207KB

    • MD5

      d9f89f4c741bb2bd29f0a375962b838e

    • SHA1

      9d314af0037bfa0ae8fee3cdc1454796de7476ae

    • SHA256

      843c781fa1d426f2112e53367ea18dbddb41b7d8b243519c3bb47d16256064e0

    • SHA512

      8d5b1a30b4a79ab8f44266c01e815688a336aac27bb5db8d14e3b18fdb299a9dde8c3d0eeeea1e04faa9925e25790159c50e5311e1d68189f84775ef52bc20cd

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks