cedcfc2954f0bef091a0db5900d0b2a13adb883d41b37d7e0db4af7234dcd862

General
Target

cedcfc2954f0bef091a0db5900d0b2a13adb883d41b37d7e0db4af7234dcd862

Size

204KB

Sample

220124-bdnshshbcl

Score
10 /10
MD5

12d2c87f6184659aeba6189dd828e062

SHA1

0b1f505a6458053f5e18fc8677b748985f669926

SHA256

cedcfc2954f0bef091a0db5900d0b2a13adb883d41b37d7e0db4af7234dcd862

SHA512

9472e0fe4ecc4afad8aa33f86fbbc0aa53003d880d12921bb0b9156d77758474fb6ccb25d175b750162abe1ebc3ea18e33f6d3898fc927afef0979c64274e4e6

Malware Config

Extracted

Path C:\704555u-readme.txt
Family sodinokibi
Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion 704555u. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/FD5299385D96D435 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/FD5299385D96D435 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: ykr+33eN9ObSq/GN0e9GPOiG303KsoW0FPS8fVuoAZFOTpQxeuYesKQ/dZ84b9PV eBJ20aOnzhkh5P1/q0D+uJubSR0mjaSpWVwsS57LsWa7jQ1OVPQ5Dw5z2ard5bQF uIc562JISdo0bbKV5UI0y216rxNnsUpqXGOnIhC1NT7VK4N1mO/mnU4WOXuyjpoW 0/Z6v8eYKjF6E8PLt/KuyHc3pfD6315awArZABUUdnMPmH3V3X2sb+8aG33iMDBD LmMT30dBmM27wyVr553T7gDdJpao5iwI2m5iCAjC2BXYa63RFGQmin1/CBvGgPbN nmQLzx6tRuDr/Qh9BwvMXKZHyiCw+TlYVb5YULie7Vns5qn6F4LKXLSRK3j31I19 9s42fglglXV7vn8Q+0Qs872U0nrORsGpEe7kN2NBVKW3LLcrG4iTfkGWmvwrU3TT d0VbkP1MofC3WZ3m1J/gb231RIpnxav9hpqfeGdtLkXFIKsA+Zc0JUPPiahbnNoU ngMy1HtyQ5GVW664kBn8/KJuFaqnei5vRvCV+XttgYb96uYZUBfJHrKenqqxiSn8 Wx9TSozGaqnCDXc0beLohy8O4vbXIdb1mWIKKN78z8RV6dsTQwjl0tlF+M/bg9Mn VYlX3JLSfFU8dgQX+H5kqALeRfXHKNoVJTPdxiusNrgq4ezgYszJehMGQ3CaJ4vT FTw8G21ufhLby1u7EI7X4cawNpMz98d6YumLZsyxQJ7CIdVxj5KkpXai8fVOF568 xxQJb4I58qpaOPlIJxAYUvGP/qIZ1iqo2vet6wdQKuz2J4SsM1orkEZnDpy83k1l BfFwnqJ7o5RhuffXkxBjiPSHHdMRJ7vP6qqcg+hdyh2zv4F2uAe+yVHzNathtOL7 70HGahYuODDrEvonbgb+8icpBCnXIDUUZPGkji6GFpBX+MTbH8CORp6jdtstgARj Q3CcyDI80qvW+T5N+KQSkFF5RvyZ3fW6FIEvLZEy2jr1aB4hBFaQ2q44zJJuflSM Md+2UxJ8FhYnjxO754CVSE5YgX8SyJkM6t+Kr3G9nXwE0dl74fTXW/Lbhre3ZMVy d+pxSqF73nH4CnxSMT5YG7vq70OOaogG6ZKEYEo8Pyn82Mf72WKg9tnRkqRXpq62 uZU= Extension name: 704555u ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/FD5299385D96D435

http://decryptor.top/FD5299385D96D435

Extracted

Family sodinokibi
Botnet 19
Campaign 99
C2

hekecrm.com

jax-interim-and-projectmanagement.com

donau-guides.eu

ideamode.com

valiant-voice.com

thehovecounsellingpractice.co.uk

sochi-okna23.ru

frimec-international.es

osn.ro

pinkxgayvideoawards.com

banksrl.co.za

startuplive.org

asiaartgallery.jp

11.in.ua

campusescalade.com

pubcon.com

mahikuchen.com

georgemuncey.com

azerbaycanas.com

wademurray.com

aceroprime.com

nevadaruralhousingstudies.org

liepertgrafikweb.at

levelseven.be

stage-infirmier.fr

poems-for-the-soul.ch

eyedoctordallas.com

nieuwsindeklas.be

jag.me

tages-geldvergleich.de

supercarhire.co.uk

michaelfiegel.com

alharsunindo.com

teutoradio.de

ilveshistoria.com

perfectgrin.com

ciga-france.fr

mrmac.com

photonag.com

modamarfil.com

molinum.pt

bakingismyyoga.com

sealgrinderpt.com

altitudeboise.com

xn--ziinoapte-6ld.ro

mind2muscle.nl

so-sage.fr

brisbaneosteopathic.com.au

dantreranch.com

olry-cloisons.fr

Attributes
net
true
pid
19
prc
firefoxconfig
infopath
steam
sqbcoreservice
mysqld_nt
oracle
mydesktopqos
msftesql
sqlbrowser
thebat
isqlplussvc
ocssd
sqlwriter
sqlagent
thunderbird
mysqld_opt
winword
wordpad
thebat64
visio
dbsnmp
msaccess
mydesktopservice
ocautoupds
ocomm
encsvc
excel
agntsvc
mysqld
synctime
tbirdconfig
outlook
mspub
onenote
xfssvccon
dbeng50
powerpnt
sqlservr
ransom_oneliner
All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions
ransom_template
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} Extension name: {EXT} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
sub
99
svc
veeam
vss
memtas
sophos
svc$
mepocs
backup
sql

Extracted

Path C:\50q9sehak-readme.txt
Family sodinokibi
Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion 50q9sehak. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/A4B0054042AC10B0 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/A4B0054042AC10B0 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: WHJmbh53JqNjAojaZKLW+tBUeSw9kvpLifz2FO6yv7lhbaPVGfmHb9+0/keNFN2l NkoqSOHBTBQjU/NsgqBhoN6W6MQHiryFrj8aTXP0DeliYQLF7jGICfcd8AssdfLu PybzOXhFc/7fqRALaLuvqxj3cv30lVX3I7g+te5IBIcpg5qkEehAWPWRnEaKJSz9 /kKaS3nXOvM32TbmMv6TP5wK+oCltRQ8FHgqd8gBKywHEzmVCokOVx0oyexE8kBo xcK8w1IrWEO5oZfv2P+zdk5y6NLWixM+REjdJ1nshrDyXbAl5RWbhRDskvQ6gWhS SfAVzGoDeArXREQ6jSueeciE5cNdXBpqjn3MR6xMWJIYZLtRS6uL+Fzghwj0EZkR SeTR8EG5C/P2WIRKnJqPuIBMeD017Wp2Lvkv/6j2hnwC+jck1y/3edod8pBDjGG3 7SZhUFtIHrJlTsmo0hJny5mpTvK2Q10sFFtHj/v1hPdO1I3mnhO36K8vI9exjuAF qBlU18Sfjre4FQ+Ly5J0GtnC+j82be0Deq4coGy5MlyO8fLljEJKeQERnMuZCM6J 5RddGd/t9WHOKY98/nlroDs/Nq2A8sscleifbfTMYTNTLoraAj+BhYmZ+Ukft7iZ UA7x18TNewPlcRvtNsXRrjmp8VUxl8aqtBXmJAYimAt+MAD36+NElRxvXbVS9mbP 6FyMsacO/2GhccT2OM1A+UPdX1SygZpKFVtTImOC53rbDmc9Joni+brhPdb927eC mOsgArX2N03XghYZS1GdRJrfBp+YojllYC++0RyPzrfKShUEcfx+dIIGmLDEJkuF sUpUcUgqmTQ9iTZA5bjoHSQwwvzat5cfMFqvTAsncJBA+LQ+695oXIFHCAurSWgr m1rTycu+iiCzPTGzjaFo8AiW+B3b5d0437bt7YCT+ScngWg/lSB0iyOX0rn0v2Oo /PMSXchLlUg5FDD4Be66IjtkbB2xdAD0gk0gsQu60exIdYns45Uoc7wYanPBI9Rq oOo40AOmWdM3JHUfIVEIlX1qUvl3/EQHenhnievFQk+0f7hWjDFGsgyphPR/5e9F NodJCnv63GQreACvwBzA3t2ogp4mZNZuwgtPkXYuwPjS75dvGfpJvranKRBpOg== Extension name: 50q9sehak ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/A4B0054042AC10B0

http://decryptor.top/A4B0054042AC10B0

Targets
Target

cedcfc2954f0bef091a0db5900d0b2a13adb883d41b37d7e0db4af7234dcd862

MD5

12d2c87f6184659aeba6189dd828e062

Filesize

204KB

Score
10/10
SHA1

0b1f505a6458053f5e18fc8677b748985f669926

SHA256

cedcfc2954f0bef091a0db5900d0b2a13adb883d41b37d7e0db4af7234dcd862

SHA512

9472e0fe4ecc4afad8aa33f86fbbc0aa53003d880d12921bb0b9156d77758474fb6ccb25d175b750162abe1ebc3ea18e33f6d3898fc927afef0979c64274e4e6

Tags

Signatures

  • Modifies system executable filetype association

    Tags

    TTPs

    Modify RegistryChange Default File Association
  • Neshta

    Description

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    Tags

  • Sodin,Sodinokibi,REvil

    Description

    Ransomware with advanced anti-analysis and privilege escalation functionality.

    Tags

  • Executes dropped EXE

  • Modifies extensions of user files

    Description

    Ransomware generally changes the extension on encrypted files.

    Tags

  • Loads dropped DLL

  • Reads user/profile data of web browsers

    Description

    Infostealers often target stored browser data, which can include saved credentials etc.

    Tags

    TTPs

    Data from Local SystemCredentials in Files
  • Enumerates connected drives

    Description

    Attempts to read the root path of hard drives other than the default C: drive.

    TTPs

    Query RegistryPeripheral Device DiscoverySystem Information Discovery
  • Drops file in System32 directory

  • Sets desktop wallpaper using registry

    Tags

    TTPs

    DefacementModify Registry

Related Tasks

MITRE ATT&CK Matrix
Command and Control
    Credential Access
    Execution
      Exfiltration
        Impact
        Initial Access
          Lateral Movement
            Privilege Escalation