97ce758904aa53c3c4b3e0e4f9fec84958c4bae0cade393d0159a78cfc79cd8d

General
Target

97ce758904aa53c3c4b3e0e4f9fec84958c4bae0cade393d0159a78cfc79cd8d

Size

204KB

Sample

220124-bxkvzaheem

Score
10 /10
MD5

bee0969692fe9aa8996a3436feb7b764

SHA1

370e8a179085da36ef9ed780ece2b75abf1a6de6

SHA256

97ce758904aa53c3c4b3e0e4f9fec84958c4bae0cade393d0159a78cfc79cd8d

SHA512

355677ffe9bf4aa69adc9dc1310e04de3493b90be26830f25cc6080c06890d055d56a0d9040c941c55db895d474f99422630c27012af06b8625971a72f6a5c6c

Malware Config

Extracted

Path C:\p85949-readme.txt
Family sodinokibi
Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion p85949. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45230101C056B520 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/45230101C056B520 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: sePu56RJ8C1mNv2qZIlM5W1T6A/P+GX3Hhi+gQBpD9+ljtEFR9ea1xHsFZYn6srY DxwhasQMd+li2YaEFVT0ux+U5OVwa7Cn5PdLCmM9DAf7ZmcjvZF6hufN+KuPDbLU MhiFlMQC5mjwPeIFXHj2OOnOSHktfaaiOsWAgpwQmp2GhAVdbhGVUFNuggzB418x EZqAbRZcjSGGpvDmONcOYzHWqOqIanyrxKfht/JkVpgtRgMJRuOr0wLWLznvDSKv Mioi8sGgxTCOg4rtuFq3nZyWudwx94aCgx+6qCmEvF8WebJOZG38KQFfgcfwFnzz 1oBSfKkhAj5mjgWbKSpuxyzOUPN7cBjRhLrKIhofZB+GJ7WScVsDjtIQaA1Kffw3 OwJ3MDF2LVRFPAoevHcUxPEOtFvx7bkspR9TklgatcG07ExQjTnI5XcSAANjJ7DJ ZZ4z5c/H/kfHxlTPmf6rdOmXTFx7DMtvyaiXP7G6iHRiYMbH8nK6x/0fG00dChVn XciawCnhvE4EqW1nkbAvTYxcbfCaMV7s891UZ+LH16EUcU7wpa41ajCwJXyU94Q4 83GkILWv8X2sDgBwUW1PzYTmiKaHlP0iQYobRocazsVQxVd0xYQ/ySWcnVb4jQuG U6//1bt42tGQscXmYtLbtdS2HAHrGQ20XI0AusK4ti5nmIoozv7Opgzeg1sERzL0 0JchCqx0TFmGMPoU+BW8xBmm7B0IzEuIf7EhkBfj06xJ7w3RyIu739YjvdVBn8BT 5m8e6d+rUhCMKiZAefF1t/s7+dwgdyZ8RqBFtmQ3Xbi+wkTUnRRKOeONCMc9BReg Nt0RHRS6yM3AMw29OIlPMiVvrXmyZpnpzNhcdNAIFXmEQ8AXt5tMLCjchORyixUL H3XQ1MIIioF5wf0V5dHmMCmnOM8seYQTCgGOR5M61K0/LEIP3HP1fXKnl+C4njo8 C8Noahe2RFqQ8nzYQ/pgm+Qx/njf2+14o+Z08Vjj18XUTgICTs7gpG6FOTa7b9Tc /N0qBZNcUdldKr0y/CWhmLKibnxWKyQ/1eSy4yIKBP0E+NOZQHNgw7gLj9Ah2ApR +5Apxiq/VmpKTogOqlVRmonVv60pncYb+pwDENRRiXh5UhxPvmzAY3SeflI9vdTE Extension name: p85949 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45230101C056B520

http://decryptor.top/45230101C056B520

Extracted

Family sodinokibi
Botnet 19
Campaign 96
C2

noda.com.ua

jalkapuu.net

azerbaycanas.com

animation-pro.co.uk

jimprattmediations.com

factoriareloj.com

rozmata.com

yourcosmicbeing.com

profiz.com

aslog.fr

rhino-turf.com

skinkeeper.li

brisbaneosteopathic.com.au

testitjavertailut.net

mayprogulka.ru

patriotcleaning.net

hawaiisteelbuilding.com

loparnille.se

nutriwell.com.sg

yournextshoes.com

beandrivingschool.com.au

smartmind.net

modamarfil.com

proffteplo.com

martha-frets-ceramics.nl

parksideseniorliving.net

vapiano.fr

letsstopsmoking.co.uk

dibli.store

1deals.com

ya-elka.ru

signededenroth.dk

yayasanprimaunggul.org

epicjapanart.com

endlessrealms.net

futurenetworking.com

thegrinningmanmusical.com

mazzaropi.com.br

richardmaybury.co.uk

masecologicos.com

motocrosshideout.com

buerocenter-butzbach-werbemittel.de

alnectus.com

acumenconsultingcompany.com

pazarspor.org.tr

alattekniksipil.com

look.academy

volta.plus

xrresources.com

greatofficespaces.net

Attributes
net
true
pid
19
prc
steam
encsvc
isqlplussvc
wordpad
oracle
ocssd
onenote
thebat
powerpnt
thebat64
mysqld
synctime
msaccess
xfssvccon
firefoxconfig
sqlagent
tbirdconfig
excel
visio
thunderbird
mydesktopqos
sqlbrowser
agntsvc
mysqld_nt
ocomm
dbsnmp
mysqld_opt
mydesktopservice
dbeng50
mspub
sqlservr
ocautoupds
infopath
msftesql
sqbcoreservice
winword
outlook
sqlwriter
ransom_oneliner
All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions
ransom_template
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} Extension name: {EXT} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
sub
96
svc
backup
veeam
svc$
sql
sophos
memtas
mepocs
vss

Extracted

Path C:\iy5r4zy9b-readme.txt
Family sodinokibi
Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion iy5r4zy9b. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F2D5D77A36801A97 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/F2D5D77A36801A97 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: mYnpZ5Veww1m0eQ7HmLNTkCxbbKJEupRpNL0H/TUESjy8GxRJlIRamRROAqzpCoR ASs8AccqbNueJKpOsRnKaX40A6NfRbKYWnD06TnVrK4/6s7/Oy0HVlPidtwAkZe+ cp4vd6aqyqx2hifabAkB4RhkkGK4IM0bwlTN/dDteDozqoCcwKysJKQSb/tjZLlo vszSmtGNcyh9qMegtM5OJdkIQ4l57YVWI7dBvW5ZbDUxLjA5t9n04QujgQ41tdH5 SRiXiMcvyg5Ob224s92eWYgAKpC8qTQFqYkxwBUgb7FBxTSXyGg17v6M2WagIkqC 0GBZEBpnIhWhl76gJTD2q80YRzsvYUcf6HCf/VKMIVGmfXAoGR2okmKaklsqHudy IeRyLF3AdMZfpKDtAoeu1S3b+gv6cu21yZh67md70SfSGBvC7fOHTSR9idt01Bgs yU94jh3f6LTzoDjEKXx+B5kJMesYJjinx8Nj0TP5lU0VhGKTQTwqkGWM6t9AZTTe Q5mDCK+JE6n37ZxhonF5yej2k8EqScv/mz2atSVpROsWkhx4UoA23A8rjiElADeh mlXYoI5VQPKQ56Fb4mYWDWNAkYWfNA/BGonIEfKoPNLUIGOGLVr4JmANc0ZNjk05 OCnziPQavk5FG5iUSJXee0nu4WTM/xawrfIq4G0JgN9Mu9ATjkQiXbCC9tPsjaqJ vzFRP0nfFn2m04bmv48nr1NMKH6jdrYmQcxcm/79w3dIwKFt1yzjRXAmUpZw9rPn xey9iaspbzZQLU73+vnKtlz+HZFntwrIs9XfyopumKl8HVS2IzpxA3ABYO6XrOST 92xbOPAE7g5R3OKluuqTCaY7WKOIu82T5wOjEilP5BaPTjlLSdHcpzuQ5s6vRdDP 7XP1BjiwjqtQlCpAWiJV/kct2Q4UAppLUISLjW/wxYuedX8QptrciaxCR9b0hGFB HkrF6RitBNBS6hLNq6SyhWXzRPoAhiCHTVaF1z1gmkJBMJS0BHKB0RbhmAnu8wtu 8GcEUsDBplKY5dwwETk0JIEW3/eZwgLQh9IPyo/otLDOcCApcnxLBXCHsYmKpMUS OKXNTdXsIZgC/FDVRMN56gsvTfyHj9UyynPzwSXEd5PD5YNbzI9UMHyjK10fWg== Extension name: iy5r4zy9b ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F2D5D77A36801A97

http://decryptor.top/F2D5D77A36801A97

Targets
Target

97ce758904aa53c3c4b3e0e4f9fec84958c4bae0cade393d0159a78cfc79cd8d

MD5

bee0969692fe9aa8996a3436feb7b764

Filesize

204KB

Score
10/10
SHA1

370e8a179085da36ef9ed780ece2b75abf1a6de6

SHA256

97ce758904aa53c3c4b3e0e4f9fec84958c4bae0cade393d0159a78cfc79cd8d

SHA512

355677ffe9bf4aa69adc9dc1310e04de3493b90be26830f25cc6080c06890d055d56a0d9040c941c55db895d474f99422630c27012af06b8625971a72f6a5c6c

Tags

Signatures

  • Detect Neshta Payload

  • Modifies system executable filetype association

    Tags

    TTPs

    Modify RegistryChange Default File Association
  • Neshta

    Description

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    Tags

  • Sodin,Sodinokibi,REvil

    Description

    Ransomware with advanced anti-analysis and privilege escalation functionality.

    Tags

  • Sodinokibi/Revil sample

  • Deletes shadow copies

    Description

    Ransomware often targets backup files to inhibit system recovery.

    Tags

    TTPs

    File DeletionInhibit System Recovery
  • Executes dropped EXE

  • Modifies extensions of user files

    Description

    Ransomware generally changes the extension on encrypted files.

    Tags

  • Loads dropped DLL

  • Reads user/profile data of web browsers

    Description

    Infostealers often target stored browser data, which can include saved credentials etc.

    Tags

    TTPs

    Data from Local SystemCredentials in Files
  • Drops desktop.ini file(s)

  • Enumerates connected drives

    Description

    Attempts to read the root path of hard drives other than the default C: drive.

    TTPs

    Query RegistryPeripheral Device DiscoverySystem Information Discovery
  • Drops file in System32 directory

  • Sets desktop wallpaper using registry

    Tags

    TTPs

    DefacementModify Registry

Related Tasks

MITRE ATT&CK Matrix
Command and Control
    Credential Access
    Execution
      Exfiltration
        Initial Access
          Lateral Movement
            Privilege Escalation