d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424

General
Target

d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424

Size

207KB

Sample

220124-ba97cahagl

Score
10 /10
MD5

8af4a97a5a07807277a02eb69a859120

SHA1

c9752d458c840ea4585efcdd16bbb5bf1a05ac44

SHA256

d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424

SHA512

c9e79390acf6245bb7936df92bf7bf560266c262199abb586a5d8f14d320a17a5a8ec3ff97efaeab11a12dc252f2fa2aaa185947faf40620b79a3bd3b4a8d393

Malware Config

Extracted

Path C:\7x8f6ued-readme.txt
Family sodinokibi
Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 7x8f6ued. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/2377B5A9E37B39BA 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/2377B5A9E37B39BA Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: HMyfPLqTEdUZMnm99Rcb4VP9j1EEUjGOrzIPfgQTHcR5mDrzlWVe8oJNu6PbZ8c/ U1tF/sP9LLtW0Z3UVQm+q5NVOyKH08+if1mXlVDz3tynFXVfD31DVwgqzKB6ZGT2 1N4IiGvMNryyqaUOUNVUkwZooUJO4meHkwoaM8oqsjpzl9mqlVfnQUmBOu741JG6 S4sLlFWMu0xib6vX+ArV8+Z1B23i9EYa1QPElmEO4xy+YeNfA4H78HWwAj5at3bG JEsfUVuCQHWg82yAmJQ1wIvIBsHLzHEiZksrNRxjm/OXO37c7ZqMj/dFsthRIckP UWioIkhOEvN+CBbOlQX32AtznqVKFLNiYVXMOpLO7vPRV9XRpqncckcpi+N47RsL U6/5kCZhFvdZjY2tTbFIib9HCveqjObfsU9f0ZvXSbIMXIKNzE1l8fcGtd7ZbeP+ rTuG0dT8J0yyws5cKLg0pQ2fy9uHFOOpcLHjvk9fzC8FGo3YNaQFJ96a1CkYq3z9 dpZHsIj6h+Hr5VlzU6jEmKcnBUJN/0uKHUtkCcbBtpiCPsTaPXTuyddU+uyTlg0S Tiloyppn1/3ssqBw18QUD6yvV1kffwExvTm4DcjBWVF0vEQvtPjhgDQG4HcFXmsa BG1h79cjCAaSIpvI9zIeZwq4nEh1RKu7hgBVCa8CUFxG2Io0ettXNs9L1w9OqNn6 SAM1ByANauvmUPahCNeNWaXtITLU65JA2hZjwDHjdb1B6UWZ5hIpCCTWjSsUmADr ZiIgVgfGBhGcjYb1bZwqcDhV8xsuCpQ7RXxjMzFn7Zn7iagEd+RV2KIyko3Vkc1X 72BP3NM61DMEM+UXhXeOm/byDjn7V8TIZ37e7piJPBjY1gRaEC89Ae2c3QHmMalN o8HdBQJ+dXqt1LWtPHtg7Y/Bs/1tCs/zZhJDz5SEAdFuJzVbxDySbPoXmZvkaQUI 8GgDqNC02xCDODZvjIzSZhzuyA+xn09zrDsKA8nTky8pI3PmTkYoBlTFhqGx34de +Z0RVsOmj4uVaXOpA2jBo/+j3UsE23cana/MNgFQkJvQFFWdguHB4zUU1CMCeiH5 yJMQTaYjMCuZ2X4GSRW/ivXz5k4m2+42bF/vlO9HYPg5AfM5E/ZvNpNdo+Kg7mPL 6qMLHr6qjtVtTkEvGS0Fpx4QjkZPW3bO5R/bE2pvFlPzhFyJxwNvlHOOYaZybWl/ Pq+99TtfAOfVdFb7QlQJgsLtVExnbNH+DPo0EIO5Spa+QgR0Nqei9lykGZVJwQqp fJ/DUFE6gXMGjYEJ2TaCUZtbFWCbFgw/BF/zYw== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/2377B5A9E37B39BA

http://decryptor.cc/2377B5A9E37B39BA

Extracted

Family sodinokibi
Botnet $2a$10$EWjSpd.R6SAti4bgJBSw9er8oKv3V7/QblFqIXtPzaY2HzBNCquva
Campaign 3178
C2

tinyagency.com

oldschoolfun.net

anthonystreetrimming.com

botanicinnovations.com

thefixhut.com

polymedia.dk

reddysbakery.com

kindersitze-vergleich.de

theapifactory.com

partnertaxi.sk

deschl.net

gw2guilds.org

smartypractice.com

restaurantesszimmer.de

vitavia.lt

advizewealth.com

edelman.jp

fibrofolliculoma.info

zweerscreatives.nl

almosthomedogrescue.dog

charlesreger.com

manijaipur.com

blog.solutionsarchitect.guru

the-virtualizer.com

fairfriends18.de

tennisclubetten.nl

body-armour.online

aarvorg.com

rumahminangberdaya.com

sw1m.ru

macabaneaupaysflechois.com

themadbotter.com

maasreusel.nl

jadwalbolanet.info

advokathuset.dk

walter-lemm.de

securityfmm.com

smhydro.com.pl

citymax-cr.com

solinegraphic.com

abogadoengijon.es

jiloc.com

ziegler-praezisionsteile.de

argenblogs.com.ar

aprepol.com

petnest.ir

wasmachtmeinfonds.at

answerstest.ru

imperfectstore.com

nakupunafoundation.org

Attributes
net
true
pid
$2a$10$EWjSpd.R6SAti4bgJBSw9er8oKv3V7/QblFqIXtPzaY2HzBNCquva
prc
winword
excel
visio
oracle
isqlplussvc
firefox
dbeng50
mspub
xfssvccon
encsvc
dbsnmp
thebat
mydesktopservice
sql
steam
wordpad
infopath
agntsvc
synctime
outlook
ocautoupds
onenote
sqbcoreservice
ocomm
tbirdconfig
thunderbird
msaccess
powerpnt
ocssd
mydesktopqos
ransom_oneliner
All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions
ransom_template
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
sub
3178
svc
memtas
mepocs
backup
sophos
sql
svc$
vss
veeam

Extracted

Path C:\n429ay-readme.txt
Family sodinokibi
Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension n429ay. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/C5C0530A6B3F84B4 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/C5C0530A6B3F84B4 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: Z+ciI4+3OQ0x+lL0CPZPBLlOAXeJEvWbRnCkoJId5zOm5doayySR53IvEb6jIrAY WC8Hjz7SoZH9pD7L+3QefWUrPxaA5y62EZ2Wra7DP23+paxHQDm8v07M2SAB10qH 8FD2abbfDtwG1YcrjN6mHVC7z3ZVzM6lINHKsoMkwv1FFxfv+5yreA2ADzeOdNZ2 crrnwttKSN46sVP6IgOU4XDvaLUiF4Tu7zKyDPiAbpxygaKFp56iQsda2U7moTOB 2oGRKhvRDtGsmf5s90dI/cXHEBCvOJBz3xegCNFMUYWVnVj5yIV18DJQ6KGztXjJ ImKHUYYVxmVMu7mS2j8fLyYlOR2fL0duFbSHnF6O+8ypviJp8K/vmucnxgOXs4tn qDwU4C9ockIOuZvBSQohd1DQXtBcUoIyYmiclFcjhfPgiN53MoHINZlxcB/iJQG5 vMGZfqQcA3aGfvWGGEBozDOqyp4MJh+nyUshzWQ8zS8PP+z5Ykn7nS7kmPaMvRfL AnzYQdhu/YHNtetsecfvS0dHieQSb5TKPK2YDmHK2GY8TcSgzb11dh2sNJvpjWoc OKDmVVOu1nKO8DFNaJQ2T7WZj+n0ZKxrOWLSIV8T6kggTC8SRUJ4AXgsYCDjO70+ /mlOGjB7k7w4cBEY2wAXG3hd6P+25Ecq1WpSAF76DqPNExjzAI6yv1ji+koHFFf8 EH6ttywVNpsYEDK7o+p+tbjO5NO4CEUPjctahxc2PEhoQ2mhuLQL1xRfGfxmGUfK rTtIelQn8DU/Th1KwmK8vi4WATgZux+276JNY9QJBjA54kcLSOt/Jy0YQYmBnojk lwoD0YsRYmJzC4dx5ySNepcXOUNJpS6oAhOP27k1mMBnHcpuuQRqqKw4Xn1VozJS eOE/jLnkNzAcTyBvXdum2kDHWLUE8Trr3lcEPiw7p2Fj2oQmmCL+z3/WwWsrsCPz Kckbes33fQz9SZOjo/I9UnsHnKqnOCf9kquUqS29rSU/bt88G3wBCJXsiUl9bP30 0S6qevqvApr43kCs44R+bt2QIHqJCgpleKdI3Mm7Frq9MeAim7q20NM5Lfv4UJof lzr6BnJVYCVahD7dw3L70bEoADrBBxn2ec3jnc5gIMZTlBFec4tjQjvmVqlRUIB7 9G5hncUVVD9am7UfNFqAOWIsFB0FSz0BNFk1IRvFZbFc7zVuNpxoxJOrGRe8OJXO eK52bg0k9l4CO39iQwBDvMxBGLVbTR0z4RrRJwTqAr/eiNWOV2zkKtxwsTnR6SAu Hl4f6VHV7mkTZHAnjliFkQ== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/C5C0530A6B3F84B4

http://decryptor.cc/C5C0530A6B3F84B4

Targets
Target

d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424

MD5

8af4a97a5a07807277a02eb69a859120

Filesize

207KB

Score
10/10
SHA1

c9752d458c840ea4585efcdd16bbb5bf1a05ac44

SHA256

d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424

SHA512

c9e79390acf6245bb7936df92bf7bf560266c262199abb586a5d8f14d320a17a5a8ec3ff97efaeab11a12dc252f2fa2aaa185947faf40620b79a3bd3b4a8d393

Tags

Signatures

  • Modifies system executable filetype association

    Tags

    TTPs

    Modify RegistryChange Default File Association
  • Neshta

    Description

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    Tags

  • Sodin,Sodinokibi,REvil

    Description

    Ransomware with advanced anti-analysis and privilege escalation functionality.

    Tags

  • Executes dropped EXE

  • Modifies extensions of user files

    Description

    Ransomware generally changes the extension on encrypted files.

    Tags

  • Loads dropped DLL

  • Reads user/profile data of web browsers

    Description

    Infostealers often target stored browser data, which can include saved credentials etc.

    Tags

    TTPs

    Data from Local SystemCredentials in Files
  • Adds Run key to start application

    Tags

    TTPs

    Registry Run Keys / Startup FolderModify Registry
  • Enumerates connected drives

    Description

    Attempts to read the root path of hard drives other than the default C: drive.

    TTPs

    Query RegistryPeripheral Device DiscoverySystem Information Discovery
  • Drops file in System32 directory

  • Sets desktop wallpaper using registry

    Tags

    TTPs

    DefacementModify Registry

Related Tasks

MITRE ATT&CK Matrix
Command and Control
    Credential Access
    Defense Evasion
    Execution
      Exfiltration
        Impact
        Initial Access
          Lateral Movement
            Privilege Escalation