General

  • Target

    b1d144a7df0d9cee58bb6222683cef1d01ff57334383da35918e5615e24de7e6

  • Size

    147KB

  • Sample

    220124-bnle5shdak

  • MD5

    8b3b88fd1b5be958d3abd1367c82f6d1

  • SHA1

    17bf4483fff749b0f436d7984ef5be83abafbc49

  • SHA256

    b1d144a7df0d9cee58bb6222683cef1d01ff57334383da35918e5615e24de7e6

  • SHA512

    2b3a1eebe6aaf7f3a3e6162ce43475b3e482b99ee8991b99fdf0f30e283335386ba82872ef7f0ce4ab043806e7df5837a187e9685ad8381767997d2a813b681f

Malware Config

Extracted

Path

C:\xmxn203r05-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion xmxn203r05. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/012CA64B4B10D099 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/012CA64B4B10D099 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: tuId8QgitcmHvdGV5+EaVxN03FWLBMmPKn31LVVSN6BzrE42b8+gdp5S3LZt7PZu jva79SGe97ypNo55YPwHodM7C4fXSiJQ89Og2ETPulVg+UrJfy9wT3SGW+4MKyLF TKH7OjfwasFCWW8az+i9blEPEh1NmxQJex9g3TM98ZY0wN3m9caHvhfdaaoUlD43 tK7KQNZTQMRIji3PdmXAX+t8Fp5zmPb38RCbJeY/fTAxRFRSM1VuJRrd87Pcvuql GkS4jK++FxzpC1x5uK7iBwOoHi8Wxeg3v7OunE8skL4Nc1vqbU7T8vzJe2l5UIS+ dwNNuwbovxndACN40D/7UwkpiYy+be8jjwpjBp09ASpkJvmbwmMHukYmaBhKQDMy yCB1BmN1KIh/e8paGkFeEbsvlvIagu44M+Id2uPlKa3QgUvVlgF0+qBieh9QFk8H kVqJZ+EL10utzmb/+8cpvcw4j98qEU/24OkKTdwsYd4tAELs8bt4u538F3aJ2/AL VHWQy+taHfUfKHhJLfzZGKClHvK39UOwMhph6Y/4+VrUP1Rm6nTd+R1COhldJBS/ 8i/2yzv862JGeALY/Z0zUqa5PG6w5iRyh4dSOAot0iKb//oL32PwPzOEerc9oAvk 14+8r8Ktof4As0kBy3Uw/NK8MQml7BBeULgsthZBCcERPhvuifHFKXNJnwf5TvKi dIf3jBecCW39JcrcgiaznD65cymcIx5Gb/G4wCm3qZkJl9z1O4c1sAmdr0HbeQha 8oM2l2V/dfPJtta53Up4djUghvW5W0aG/x+PC8Ub2h76dxS0xBS+42H4IihNQxAn Hyc3bFYfjGwFkPPG0A02D5MblgdKSQYB/fW04hx6zLGUNvXWujsfMpwtCOSvZlKh WhPl1n+6hlc81Iog+Q8/kYN4Zc+TSO9VvPx/1gLTiOYrxV6Js0GccZXwYaQOssYI flzrbm7O1oKBqDtGkbJj9VRnAQCs9LXts5M0ilSIk3/ZJyXvbKBHe3SODsJAdBKq 7OIlGnZ89bkaHlwco3KCbJcj17uUvrvcUkP6esIZmzahUwYdaGZJB8smHoJLHSpU ZAn/iAt/cq9Dx3zK86KsgHMnrI951806Z+9b5Fn1qXBT1+r3wcYb44YVHD6OqWUL zJLZpS4ff0rIn0kWXgax7aqpYxT07xwn3yv8KZWZ1kw3rWQHonWTE5jhhLY8jYaC kY08zfoWUr8hy+eTANeLS/1PnVEHQPzu3z7kmeAd/CpSXO7xASQG4XhDOGxcf8iS IAntOrZja7bH0OhafquW/i127bTm34izX1QSrGk2Sz4= Extension name: xmxn203r05 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/012CA64B4B10D099

http://decryptor.cc/012CA64B4B10D099

Extracted

Family

sodinokibi

Botnet

$2a$10$R6jfdY.02Ns/TL60z.A74O5Dw8.5EqXA63YzUP5X2NSO0l.4y0Gfa

Campaign

1428

C2

firstpaymentservices.com

krcove-zily.eu

softsproductkey.com

naturavetal.hr

corelifenutrition.com

leda-ukraine.com.ua

beaconhealthsystem.org

acomprarseguidores.com

extraordinaryoutdoors.com

mardenherefordshire-pc.gov.uk

stopilhan.com

triggi.de

anteniti.com

aunexis.ch

boosthybrid.com.au

bee4win.com

gadgetedges.com

tandartspraktijkheesch.nl

8449nohate.org

simoneblum.de

Attributes
  • net

    true

  • pid

    $2a$10$R6jfdY.02Ns/TL60z.A74O5Dw8.5EqXA63YzUP5X2NSO0l.4y0Gfa

  • prc

    excel

    mydesktopservice

    sqlwriter

    ocomm

    powerpnt

    oracle

    mydesktopqos

    ocautoupds

    ocssd

    encsvc

    mysqld_opt

    msaccess

    visio

    agntsvc

    winword

    sqlservr

    tbirdconfig

    wordpad

    xfssvccon

    msftesql

    firefoxconfig

    dbsnmp

    onenote

    thunderbird

    outlook

    isqlplussvc

    dbeng50

    mspub

    thebat64

    sqbcoreservice

    synctime

    sqlbrowser

    steam

    sqlagent

    infopath

    mysqld

    mysqld_nt

    thebat

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} Extension name: {EXT} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    1428

  • svc

    vss

    mepocs

    veeam

    svc$

    backup

    sophos

    memtas

    sql

Targets

    • Target

      b1d144a7df0d9cee58bb6222683cef1d01ff57334383da35918e5615e24de7e6

    • Size

      147KB

    • MD5

      8b3b88fd1b5be958d3abd1367c82f6d1

    • SHA1

      17bf4483fff749b0f436d7984ef5be83abafbc49

    • SHA256

      b1d144a7df0d9cee58bb6222683cef1d01ff57334383da35918e5615e24de7e6

    • SHA512

      2b3a1eebe6aaf7f3a3e6162ce43475b3e482b99ee8991b99fdf0f30e283335386ba82872ef7f0ce4ab043806e7df5837a187e9685ad8381767997d2a813b681f

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Impact

Defacement

1
T1491

Tasks