General

  • Target

    cedcfc2954f0bef091a0db5900d0b2a13adb883d41b37d7e0db4af7234dcd862

  • Size

    204KB

  • Sample

    220124-bdnshshbcl

  • MD5

    12d2c87f6184659aeba6189dd828e062

  • SHA1

    0b1f505a6458053f5e18fc8677b748985f669926

  • SHA256

    cedcfc2954f0bef091a0db5900d0b2a13adb883d41b37d7e0db4af7234dcd862

  • SHA512

    9472e0fe4ecc4afad8aa33f86fbbc0aa53003d880d12921bb0b9156d77758474fb6ccb25d175b750162abe1ebc3ea18e33f6d3898fc927afef0979c64274e4e6

Malware Config

Extracted

Path

C:\704555u-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion 704555u. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/FD5299385D96D435 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/FD5299385D96D435 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: ykr+33eN9ObSq/GN0e9GPOiG303KsoW0FPS8fVuoAZFOTpQxeuYesKQ/dZ84b9PV eBJ20aOnzhkh5P1/q0D+uJubSR0mjaSpWVwsS57LsWa7jQ1OVPQ5Dw5z2ard5bQF uIc562JISdo0bbKV5UI0y216rxNnsUpqXGOnIhC1NT7VK4N1mO/mnU4WOXuyjpoW 0/Z6v8eYKjF6E8PLt/KuyHc3pfD6315awArZABUUdnMPmH3V3X2sb+8aG33iMDBD LmMT30dBmM27wyVr553T7gDdJpao5iwI2m5iCAjC2BXYa63RFGQmin1/CBvGgPbN nmQLzx6tRuDr/Qh9BwvMXKZHyiCw+TlYVb5YULie7Vns5qn6F4LKXLSRK3j31I19 9s42fglglXV7vn8Q+0Qs872U0nrORsGpEe7kN2NBVKW3LLcrG4iTfkGWmvwrU3TT d0VbkP1MofC3WZ3m1J/gb231RIpnxav9hpqfeGdtLkXFIKsA+Zc0JUPPiahbnNoU ngMy1HtyQ5GVW664kBn8/KJuFaqnei5vRvCV+XttgYb96uYZUBfJHrKenqqxiSn8 Wx9TSozGaqnCDXc0beLohy8O4vbXIdb1mWIKKN78z8RV6dsTQwjl0tlF+M/bg9Mn VYlX3JLSfFU8dgQX+H5kqALeRfXHKNoVJTPdxiusNrgq4ezgYszJehMGQ3CaJ4vT FTw8G21ufhLby1u7EI7X4cawNpMz98d6YumLZsyxQJ7CIdVxj5KkpXai8fVOF568 xxQJb4I58qpaOPlIJxAYUvGP/qIZ1iqo2vet6wdQKuz2J4SsM1orkEZnDpy83k1l BfFwnqJ7o5RhuffXkxBjiPSHHdMRJ7vP6qqcg+hdyh2zv4F2uAe+yVHzNathtOL7 70HGahYuODDrEvonbgb+8icpBCnXIDUUZPGkji6GFpBX+MTbH8CORp6jdtstgARj Q3CcyDI80qvW+T5N+KQSkFF5RvyZ3fW6FIEvLZEy2jr1aB4hBFaQ2q44zJJuflSM Md+2UxJ8FhYnjxO754CVSE5YgX8SyJkM6t+Kr3G9nXwE0dl74fTXW/Lbhre3ZMVy d+pxSqF73nH4CnxSMT5YG7vq70OOaogG6ZKEYEo8Pyn82Mf72WKg9tnRkqRXpq62 uZU= Extension name: 704555u ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/FD5299385D96D435

http://decryptor.top/FD5299385D96D435

Extracted

Family

sodinokibi

Botnet

19

Campaign

99

C2

hekecrm.com

jax-interim-and-projectmanagement.com

donau-guides.eu

ideamode.com

valiant-voice.com

thehovecounsellingpractice.co.uk

sochi-okna23.ru

frimec-international.es

osn.ro

pinkxgayvideoawards.com

banksrl.co.za

startuplive.org

asiaartgallery.jp

11.in.ua

campusescalade.com

pubcon.com

mahikuchen.com

georgemuncey.com

azerbaycanas.com

wademurray.com

Attributes
  • net

    true

  • pid

    19

  • prc

    firefoxconfig

    infopath

    steam

    sqbcoreservice

    mysqld_nt

    oracle

    mydesktopqos

    msftesql

    sqlbrowser

    thebat

    isqlplussvc

    ocssd

    sqlwriter

    sqlagent

    thunderbird

    mysqld_opt

    winword

    wordpad

    thebat64

    visio

    dbsnmp

    msaccess

    mydesktopservice

    ocautoupds

    ocomm

    encsvc

    excel

    agntsvc

    mysqld

    synctime

    tbirdconfig

    outlook

    mspub

    onenote

    xfssvccon

    dbeng50

    powerpnt

    sqlservr

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} Extension name: {EXT} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    99

  • svc

    veeam

    vss

    memtas

    sophos

    svc$

    mepocs

    backup

    sql

Extracted

Path

C:\50q9sehak-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion 50q9sehak. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/A4B0054042AC10B0 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/A4B0054042AC10B0 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: WHJmbh53JqNjAojaZKLW+tBUeSw9kvpLifz2FO6yv7lhbaPVGfmHb9+0/keNFN2l NkoqSOHBTBQjU/NsgqBhoN6W6MQHiryFrj8aTXP0DeliYQLF7jGICfcd8AssdfLu PybzOXhFc/7fqRALaLuvqxj3cv30lVX3I7g+te5IBIcpg5qkEehAWPWRnEaKJSz9 /kKaS3nXOvM32TbmMv6TP5wK+oCltRQ8FHgqd8gBKywHEzmVCokOVx0oyexE8kBo xcK8w1IrWEO5oZfv2P+zdk5y6NLWixM+REjdJ1nshrDyXbAl5RWbhRDskvQ6gWhS SfAVzGoDeArXREQ6jSueeciE5cNdXBpqjn3MR6xMWJIYZLtRS6uL+Fzghwj0EZkR SeTR8EG5C/P2WIRKnJqPuIBMeD017Wp2Lvkv/6j2hnwC+jck1y/3edod8pBDjGG3 7SZhUFtIHrJlTsmo0hJny5mpTvK2Q10sFFtHj/v1hPdO1I3mnhO36K8vI9exjuAF qBlU18Sfjre4FQ+Ly5J0GtnC+j82be0Deq4coGy5MlyO8fLljEJKeQERnMuZCM6J 5RddGd/t9WHOKY98/nlroDs/Nq2A8sscleifbfTMYTNTLoraAj+BhYmZ+Ukft7iZ UA7x18TNewPlcRvtNsXRrjmp8VUxl8aqtBXmJAYimAt+MAD36+NElRxvXbVS9mbP 6FyMsacO/2GhccT2OM1A+UPdX1SygZpKFVtTImOC53rbDmc9Joni+brhPdb927eC mOsgArX2N03XghYZS1GdRJrfBp+YojllYC++0RyPzrfKShUEcfx+dIIGmLDEJkuF sUpUcUgqmTQ9iTZA5bjoHSQwwvzat5cfMFqvTAsncJBA+LQ+695oXIFHCAurSWgr m1rTycu+iiCzPTGzjaFo8AiW+B3b5d0437bt7YCT+ScngWg/lSB0iyOX0rn0v2Oo /PMSXchLlUg5FDD4Be66IjtkbB2xdAD0gk0gsQu60exIdYns45Uoc7wYanPBI9Rq oOo40AOmWdM3JHUfIVEIlX1qUvl3/EQHenhnievFQk+0f7hWjDFGsgyphPR/5e9F NodJCnv63GQreACvwBzA3t2ogp4mZNZuwgtPkXYuwPjS75dvGfpJvranKRBpOg== Extension name: 50q9sehak ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/A4B0054042AC10B0

http://decryptor.top/A4B0054042AC10B0

Targets

    • Target

      cedcfc2954f0bef091a0db5900d0b2a13adb883d41b37d7e0db4af7234dcd862

    • Size

      204KB

    • MD5

      12d2c87f6184659aeba6189dd828e062

    • SHA1

      0b1f505a6458053f5e18fc8677b748985f669926

    • SHA256

      cedcfc2954f0bef091a0db5900d0b2a13adb883d41b37d7e0db4af7234dcd862

    • SHA512

      9472e0fe4ecc4afad8aa33f86fbbc0aa53003d880d12921bb0b9156d77758474fb6ccb25d175b750162abe1ebc3ea18e33f6d3898fc927afef0979c64274e4e6

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Change Default File Association

1
T1042

Defense Evasion

Modify Registry

3
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Impact

Defacement

1
T1491

Tasks