843c781fa1d426f2112e53367ea18dbddb41b7d8b243519c3bb47d16256064e0

General
Target

843c781fa1d426f2112e53367ea18dbddb41b7d8b243519c3bb47d16256064e0

Size

207KB

Sample

220124-b4csyahgd6

Score
10 /10
MD5

d9f89f4c741bb2bd29f0a375962b838e

SHA1

9d314af0037bfa0ae8fee3cdc1454796de7476ae

SHA256

843c781fa1d426f2112e53367ea18dbddb41b7d8b243519c3bb47d16256064e0

SHA512

8d5b1a30b4a79ab8f44266c01e815688a336aac27bb5db8d14e3b18fdb299a9dde8c3d0eeeea1e04faa9925e25790159c50e5311e1d68189f84775ef52bc20cd

Malware Config

Extracted

Path C:\dxm16gd30-readme.txt
Family sodinokibi
Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion dxm16gd30. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/5C81357DCD1930BD 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/5C81357DCD1930BD Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: WrXBflGDY9fhXynkemJhlOZheVj/VRPIkSdMimimzLQK4wU0Xs7Bw+1gTqoKIn59 JgX+Vh3GwCC2SDL21zbokp3fkqk1qdAgl+7kMktWTvW6rUDvKO9mIRQ6DJQson/O Zey+QKPLjI5RlB6688shUOI5bgu7f2CDz/s5idKTxqygn4QAI4nWgKQBMW1RzJ1v JzscZwjoJSTVwMRqVAN9zzH/hQh8DrlMRJEwnaZ4hmU/Nlu12pe0vOLA6AODDjBh vi6PdgImSqqvidDxlHcgU4Q0UJhp8Vx+dxFQn10O2BUlPL+PkhSMMl2vEoVqClXk AM0tSSRlwLjVeYF2XXpVBBiDVOxYqazPNOp3xIcydmnkVojrv3MYRyHMRqHyogm3 uOsOYr2rh37Upim8b7XRUMPGigOtN+rXqfb9ZQnCOq6jcbo36xra/Aq8Y2uKB4Dv hX/jDS13ks8C1bG5EMitm1c6wSpCs4iIerbtYH9bzJYlEsxuklO0HWCJFj7mY4XR JYsq4OIBw7XVmK5ZVj6E6Rd6Ah67tZNCowC12v45nlwbg2ylZapltzF9aQaGclzt /fXzTQMdPS1TE64PrVcMVkmuvErWya3t9wWXYG7M2AE0XyuhnN/CKT6i8zOsRwEe b8YiioWKJ5pP+TusEnrk7XeXB6bSt6hz4Mn6Z6cDPPllfjXZA5phtO8H8Gg8DZz2 XR2pdIwR+3jmTeAbsDPd3OYcA77ULbyvNz/S/AMn3sSvAsvsJhNxrE3Fwr9H5CTT bjRzTkoE6jXzqFo455g/CGP4r0EBTZs71u5RGxDK13+Q3ECuX/cdHqgbUuMhkoph vIizs3N7EF5VEjHZTaKFcfnrZczTGx6+UjoQnTGjEI8BS302RG8Laq/UuvfZJ2tW YPGMKzvGmM1+JQM27tBjxlluryF0Pn/Fyh4JpRrOuDIYfXJ5JJCzZtKCxRBkFTF9 19Et1wQNADPC/2qcHWxY0PMakKMuzbHUBhG+v1OZ8KIljLEQE7/WUV8ArLdtm/UC /WJMrPYP0wfPAzoNWxNnRN7cyCxADM2bJlxUIyjyBlDVuacff4ZK/yRm/HSSuZO4 ElEbG7YJbW40ukR594Vnz5ncXaUfFvRRybZ4y1bOi3kG/53wjbxZ5nQ73SBZV2DE VMjzSxxg+A2YG09jfEY8xL7Q3u900LdfXHmlM5sSFNsAGNr0JLsoCUoqpi5mpBpd fr6IdVt/qjZXnGsLM3/D0Kw6GTbYQQI13I7iSWY3vZH3OQDYw88QtkY9TBGyLJol U0aMldJRagLaa9w4O9iLjsCZaRedly72InXZFLqR Extension name: dxm16gd30 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/5C81357DCD1930BD

http://decryptor.cc/5C81357DCD1930BD

Extracted

Family sodinokibi
Botnet $2a$10$68XDJqNysd88BgVGYrJ7PO1MhEgkwxGhBfpAuTPWzBbc53gtZZK62
Campaign 1428
C2

marathonerpaolo.com

danubecloud.com

dirittosanitario.biz

1kbk.com.ua

moveonnews.com

bestbet.com

projetlyonturin.fr

www1.proresult.no

musictreehouse.net

ligiercenter-sachsen.de

effortlesspromo.com

theduke.de

xn--fn-kka.no

artallnightdc.com

celeclub.org

xn--thucmctc-13a1357egba.com

schmalhorst.de

carlosja.com

renergysolution.com

cleliaekiko.online

selfoutlet.com

forskolorna.org

rksbusiness.com

wari.com.pe

surespark.org.uk

oneplusresource.org

carrybrands.nl

naturstein-hotte.de

scenepublique.net

commercialboatbuilding.com

gamesboard.info

ouryoungminds.wordpress.com

sweering.fr

stoneys.ch

roygolden.com

bargningavesta.se

servicegsm.net

insigniapmg.com

siluet-decor.ru

kenhnoithatgo.com

nsec.se

koko-nora.dk

rollingrockcolumbia.com

binder-buerotechnik.at

navyfederalautooverseas.com

better.town

boldcitydowntown.com

dublikator.com

leda-ukraine.com.ua

dubscollective.com

Attributes
net
true
pid
$2a$10$68XDJqNysd88BgVGYrJ7PO1MhEgkwxGhBfpAuTPWzBbc53gtZZK62
prc
thebat64
mydesktopqos
winword
outlook
infopath
dbsnmp
mysqld_nt
synctime
mysqld_opt
mspub
ocssd
steam
thunderbird
msaccess
sqlwriter
excel
msftesql
agntsvc
sqlbrowser
encsvc
thebat
firefoxconfig
wordpad
onenote
visio
sqlagent
dbeng50
sqbcoreservice
ocomm
isqlplussvc
mysqld
xfssvccon
oracle
powerpnt
sqlservr
tbirdconfig
ocautoupds
mydesktopservice
ransom_oneliner
All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions
ransom_template
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} Extension name: {EXT} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
sub
1428
svc
svc$
vss
sql
memtas
backup
mepocs
veeam
sophos

Extracted

Path C:\g73ndx739-readme.txt
Family sodinokibi
Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion g73ndx739. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/37CA594BBE0E22B7 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/37CA594BBE0E22B7 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: /9OlTGfJfdMhtKG7h0WfPozuHVBbva2FW1Q12jDh/D3ipYCP0IYC0oi0MJDU5iBi jgDfmtgrrZkID7P2OOa7YW+conX3jSVt8RNihCDu7HUdnskoAZDvvxZlc8bZDnbW dPM5JRcH1RwxnFIsi2uPX5YDDPdFKG6zO0SVwckxRq6Dx7ZevtI8ImFSAAjQ7JrG 4MUizMPFOzZFLdmqwYDyTznTq6xUDojd81PzTi0j6+Fo3U3VePVFJzwXJn5RK6TY XV8ljY02RpKh/RCH9fKIUpHRBFzOO7QynAeEUxjglR6lg1+En2QBMmqUVOJGzBzp E7NElTHAgPJmaHCvr1tshMuogwQxP400NANaQxu7/XvlCBSkPUJhzRXN/wJWM4bt r5XfJGIT6RtMDjePykoLGur/aDzTNAUvrFOp6maM2yxHStFWCmXH8ATMqwBUrc7G intYpXpQFdzopK0eyNst9NjImSz78HOlFe4q+LcUTH5nVy/VQ5Jh6baNOeD7kdr2 wx9aA8eeXTepfMiEd9JZQLtUYtomS4dGzOzAvF92aywsu/wD6ZH4Whojy85X6utw yWO27ajd+Qo1hgHM0Bl5H/D5LzsWIqufF0iVmWz/4Vsz9PrPe5DGTUg3YEUM9aUx QIU4PLvRbFfByV4+8S77aKhJrbG6mvplGRuwquQQMA0JvLkxO27DBXmofeyY4UkG M/RRzzsjm7MtFIN83btzLwKaR5eMMI6BboK87s4rT7WW+LBxJfmmOPfbpCQgd6GM FySC+IxnHUsgD/8siLqX8NWISbe6M+LV73wVHvpzFdVVNdJo8XhJTPd7Dgq1BgoX zOFq8RWJgHWEKN4kk+QbOqcARAca6jbEh3xKq1GJejB8g/VLllMxnW6+z/ID/9F5 lqeXMBXAc+63D10+/oF09VIxRlG7h0V68elqPoUnqgof+L6E5VmBGdfsdbU6TWDi sKTBaukWB4S7AlkHPVAVR5naSQf7wqJObu5EEkCbGZvUovdFiyCs5ZAUbYv+HtLD 7Dwy8C0PvQ6Op5DNId3sdilneYredh8vkJWPuEer2egg1O6Hl+OpeLjQDdv1PqP2 iJKya4sLjrEtJPl9uT+yP0uwQzSvPzuOwdNdfd3lidhyY6p1EsujAIrUXyJkfwxm DfDc8a15Nju+Ol3m0dgqJppsSTLIS27IDg3egQOAve7n8fqLb7J89DvB6gpGT/Id e3SjzWh/BdKXnWdW4qOVile9rllJFOJFMDsE5Y9erCQqFOTv+Cn5giOFQMLZ6O9s 0B31fN0qXE3XQkwMyyv2O1jn6iucfA== Extension name: g73ndx739 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/37CA594BBE0E22B7

http://decryptor.cc/37CA594BBE0E22B7

Targets
Target

843c781fa1d426f2112e53367ea18dbddb41b7d8b243519c3bb47d16256064e0

MD5

d9f89f4c741bb2bd29f0a375962b838e

Filesize

207KB

Score
10/10
SHA1

9d314af0037bfa0ae8fee3cdc1454796de7476ae

SHA256

843c781fa1d426f2112e53367ea18dbddb41b7d8b243519c3bb47d16256064e0

SHA512

8d5b1a30b4a79ab8f44266c01e815688a336aac27bb5db8d14e3b18fdb299a9dde8c3d0eeeea1e04faa9925e25790159c50e5311e1d68189f84775ef52bc20cd

Tags

Signatures

  • Modifies system executable filetype association

    Tags

    TTPs

    Modify RegistryChange Default File Association
  • Neshta

    Description

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    Tags

  • Sodin,Sodinokibi,REvil

    Description

    Ransomware with advanced anti-analysis and privilege escalation functionality.

    Tags

  • Executes dropped EXE

  • Modifies extensions of user files

    Description

    Ransomware generally changes the extension on encrypted files.

    Tags

  • Loads dropped DLL

  • Reads user/profile data of web browsers

    Description

    Infostealers often target stored browser data, which can include saved credentials etc.

    Tags

    TTPs

    Data from Local SystemCredentials in Files
  • Adds Run key to start application

    Tags

    TTPs

    Registry Run Keys / Startup FolderModify Registry
  • Enumerates connected drives

    Description

    Attempts to read the root path of hard drives other than the default C: drive.

    TTPs

    Query RegistryPeripheral Device DiscoverySystem Information Discovery
  • Drops file in System32 directory

  • Sets desktop wallpaper using registry

    Tags

    TTPs

    DefacementModify Registry

Related Tasks

MITRE ATT&CK Matrix
Command and Control
    Credential Access
    Defense Evasion
    Execution
      Exfiltration
        Impact
        Initial Access
          Lateral Movement
            Privilege Escalation