General

  • Target

    c62bf783f07041cb6d55dfdefcfdefebb057a0c89ed1fbefd69e657fa082e46f

  • Size

    114KB

  • Sample

    220124-bgcjnahbgr

  • MD5

    928826c667e6388e368bbacbc06b8206

  • SHA1

    cbfef363f48fedf136e257650a367aad89c5c4a7

  • SHA256

    c62bf783f07041cb6d55dfdefcfdefebb057a0c89ed1fbefd69e657fa082e46f

  • SHA512

    6b479dccfb3cb12ceea6b44d5a3944281c7ea201103b132be2c8e7c22130aa70e6628a4ccbecf197b47cb1dd21726c24b7dc846b11c7e1cc89d402bc80ecb29c

Malware Config

Extracted

Family

sodinokibi

Botnet

$2a$10$lGp2JcvjE9cToHJGJR2Y.uxlgJ3JOuVllh4QSFjGKkgSt.LX5Ep.6

Campaign

3924

C2

finde-deine-marke.de

anthonystreetrimming.com

tstaffing.nl

acomprarseguidores.com

leoben.at

testcoreprohealthuk.com

asteriag.com

wmiadmin.com

newyou.at

darnallwellbeing.org.uk

jusibe.com

ora-it.de

remcakram.com

jobmap.at

malychanieruchomoscipremium.com

chandlerpd.com

nativeformulas.com

gadgetedges.com

philippedebroca.com

supportsumba.nl

Attributes
  • net

    false

  • pid

    $2a$10$lGp2JcvjE9cToHJGJR2Y.uxlgJ3JOuVllh4QSFjGKkgSt.LX5Ep.6

  • prc

    crm

    xfssvccon

    svc$

    thunderbird

    dbeng50

    powerpnt

    msaccess

    srv

    ocautoupds

    dbs

    oracle

    pos

    excel

    outlook

    java

    ssms

    qb

    ax32

    ocomm

    word

    visio

    w3wp

    ocssd

    exchange

    mydesktopqos

    synctime

    store

    sophos

    infopath

    sql

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    3924

  • svc

    backup

    sophos

    vss

    quickbooks

    pos

    exchange

    memtas

    sage

    qb

    veeam

    sql

    svc$

    oracle

    mepocs

    crm

Targets

    • Target

      c62bf783f07041cb6d55dfdefcfdefebb057a0c89ed1fbefd69e657fa082e46f

    • Size

      114KB

    • MD5

      928826c667e6388e368bbacbc06b8206

    • SHA1

      cbfef363f48fedf136e257650a367aad89c5c4a7

    • SHA256

      c62bf783f07041cb6d55dfdefcfdefebb057a0c89ed1fbefd69e657fa082e46f

    • SHA512

      6b479dccfb3cb12ceea6b44d5a3944281c7ea201103b132be2c8e7c22130aa70e6628a4ccbecf197b47cb1dd21726c24b7dc846b11c7e1cc89d402bc80ecb29c

    Score
    6/10
    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks