General

  • Target

    97ce758904aa53c3c4b3e0e4f9fec84958c4bae0cade393d0159a78cfc79cd8d

  • Size

    204KB

  • Sample

    220124-bxkvzaheem

  • MD5

    bee0969692fe9aa8996a3436feb7b764

  • SHA1

    370e8a179085da36ef9ed780ece2b75abf1a6de6

  • SHA256

    97ce758904aa53c3c4b3e0e4f9fec84958c4bae0cade393d0159a78cfc79cd8d

  • SHA512

    355677ffe9bf4aa69adc9dc1310e04de3493b90be26830f25cc6080c06890d055d56a0d9040c941c55db895d474f99422630c27012af06b8625971a72f6a5c6c

Malware Config

Extracted

Path

C:\p85949-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion p85949. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45230101C056B520 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/45230101C056B520 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: sePu56RJ8C1mNv2qZIlM5W1T6A/P+GX3Hhi+gQBpD9+ljtEFR9ea1xHsFZYn6srY DxwhasQMd+li2YaEFVT0ux+U5OVwa7Cn5PdLCmM9DAf7ZmcjvZF6hufN+KuPDbLU MhiFlMQC5mjwPeIFXHj2OOnOSHktfaaiOsWAgpwQmp2GhAVdbhGVUFNuggzB418x EZqAbRZcjSGGpvDmONcOYzHWqOqIanyrxKfht/JkVpgtRgMJRuOr0wLWLznvDSKv Mioi8sGgxTCOg4rtuFq3nZyWudwx94aCgx+6qCmEvF8WebJOZG38KQFfgcfwFnzz 1oBSfKkhAj5mjgWbKSpuxyzOUPN7cBjRhLrKIhofZB+GJ7WScVsDjtIQaA1Kffw3 OwJ3MDF2LVRFPAoevHcUxPEOtFvx7bkspR9TklgatcG07ExQjTnI5XcSAANjJ7DJ ZZ4z5c/H/kfHxlTPmf6rdOmXTFx7DMtvyaiXP7G6iHRiYMbH8nK6x/0fG00dChVn XciawCnhvE4EqW1nkbAvTYxcbfCaMV7s891UZ+LH16EUcU7wpa41ajCwJXyU94Q4 83GkILWv8X2sDgBwUW1PzYTmiKaHlP0iQYobRocazsVQxVd0xYQ/ySWcnVb4jQuG U6//1bt42tGQscXmYtLbtdS2HAHrGQ20XI0AusK4ti5nmIoozv7Opgzeg1sERzL0 0JchCqx0TFmGMPoU+BW8xBmm7B0IzEuIf7EhkBfj06xJ7w3RyIu739YjvdVBn8BT 5m8e6d+rUhCMKiZAefF1t/s7+dwgdyZ8RqBFtmQ3Xbi+wkTUnRRKOeONCMc9BReg Nt0RHRS6yM3AMw29OIlPMiVvrXmyZpnpzNhcdNAIFXmEQ8AXt5tMLCjchORyixUL H3XQ1MIIioF5wf0V5dHmMCmnOM8seYQTCgGOR5M61K0/LEIP3HP1fXKnl+C4njo8 C8Noahe2RFqQ8nzYQ/pgm+Qx/njf2+14o+Z08Vjj18XUTgICTs7gpG6FOTa7b9Tc /N0qBZNcUdldKr0y/CWhmLKibnxWKyQ/1eSy4yIKBP0E+NOZQHNgw7gLj9Ah2ApR +5Apxiq/VmpKTogOqlVRmonVv60pncYb+pwDENRRiXh5UhxPvmzAY3SeflI9vdTE Extension name: p85949 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/45230101C056B520

http://decryptor.top/45230101C056B520

Extracted

Family

sodinokibi

Botnet

19

Campaign

96

C2

noda.com.ua

jalkapuu.net

azerbaycanas.com

animation-pro.co.uk

jimprattmediations.com

factoriareloj.com

rozmata.com

yourcosmicbeing.com

profiz.com

aslog.fr

rhino-turf.com

skinkeeper.li

brisbaneosteopathic.com.au

testitjavertailut.net

mayprogulka.ru

patriotcleaning.net

hawaiisteelbuilding.com

loparnille.se

nutriwell.com.sg

yournextshoes.com

Attributes
  • net

    true

  • pid

    19

  • prc

    steam

    encsvc

    isqlplussvc

    wordpad

    oracle

    ocssd

    onenote

    thebat

    powerpnt

    thebat64

    mysqld

    synctime

    msaccess

    xfssvccon

    firefoxconfig

    sqlagent

    tbirdconfig

    excel

    visio

    thunderbird

    mydesktopqos

    sqlbrowser

    agntsvc

    mysqld_nt

    ocomm

    dbsnmp

    mysqld_opt

    mydesktopservice

    dbeng50

    mspub

    sqlservr

    ocautoupds

    infopath

    msftesql

    sqbcoreservice

    winword

    outlook

    sqlwriter

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} Extension name: {EXT} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    96

  • svc

    backup

    veeam

    svc$

    sql

    sophos

    memtas

    mepocs

    vss

Extracted

Path

C:\iy5r4zy9b-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion iy5r4zy9b. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F2D5D77A36801A97 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/F2D5D77A36801A97 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: mYnpZ5Veww1m0eQ7HmLNTkCxbbKJEupRpNL0H/TUESjy8GxRJlIRamRROAqzpCoR ASs8AccqbNueJKpOsRnKaX40A6NfRbKYWnD06TnVrK4/6s7/Oy0HVlPidtwAkZe+ cp4vd6aqyqx2hifabAkB4RhkkGK4IM0bwlTN/dDteDozqoCcwKysJKQSb/tjZLlo vszSmtGNcyh9qMegtM5OJdkIQ4l57YVWI7dBvW5ZbDUxLjA5t9n04QujgQ41tdH5 SRiXiMcvyg5Ob224s92eWYgAKpC8qTQFqYkxwBUgb7FBxTSXyGg17v6M2WagIkqC 0GBZEBpnIhWhl76gJTD2q80YRzsvYUcf6HCf/VKMIVGmfXAoGR2okmKaklsqHudy IeRyLF3AdMZfpKDtAoeu1S3b+gv6cu21yZh67md70SfSGBvC7fOHTSR9idt01Bgs yU94jh3f6LTzoDjEKXx+B5kJMesYJjinx8Nj0TP5lU0VhGKTQTwqkGWM6t9AZTTe Q5mDCK+JE6n37ZxhonF5yej2k8EqScv/mz2atSVpROsWkhx4UoA23A8rjiElADeh mlXYoI5VQPKQ56Fb4mYWDWNAkYWfNA/BGonIEfKoPNLUIGOGLVr4JmANc0ZNjk05 OCnziPQavk5FG5iUSJXee0nu4WTM/xawrfIq4G0JgN9Mu9ATjkQiXbCC9tPsjaqJ vzFRP0nfFn2m04bmv48nr1NMKH6jdrYmQcxcm/79w3dIwKFt1yzjRXAmUpZw9rPn xey9iaspbzZQLU73+vnKtlz+HZFntwrIs9XfyopumKl8HVS2IzpxA3ABYO6XrOST 92xbOPAE7g5R3OKluuqTCaY7WKOIu82T5wOjEilP5BaPTjlLSdHcpzuQ5s6vRdDP 7XP1BjiwjqtQlCpAWiJV/kct2Q4UAppLUISLjW/wxYuedX8QptrciaxCR9b0hGFB HkrF6RitBNBS6hLNq6SyhWXzRPoAhiCHTVaF1z1gmkJBMJS0BHKB0RbhmAnu8wtu 8GcEUsDBplKY5dwwETk0JIEW3/eZwgLQh9IPyo/otLDOcCApcnxLBXCHsYmKpMUS OKXNTdXsIZgC/FDVRMN56gsvTfyHj9UyynPzwSXEd5PD5YNbzI9UMHyjK10fWg== Extension name: iy5r4zy9b ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F2D5D77A36801A97

http://decryptor.top/F2D5D77A36801A97

Targets

    • Target

      97ce758904aa53c3c4b3e0e4f9fec84958c4bae0cade393d0159a78cfc79cd8d

    • Size

      204KB

    • MD5

      bee0969692fe9aa8996a3436feb7b764

    • SHA1

      370e8a179085da36ef9ed780ece2b75abf1a6de6

    • SHA256

      97ce758904aa53c3c4b3e0e4f9fec84958c4bae0cade393d0159a78cfc79cd8d

    • SHA512

      355677ffe9bf4aa69adc9dc1310e04de3493b90be26830f25cc6080c06890d055d56a0d9040c941c55db895d474f99422630c27012af06b8625971a72f6a5c6c

    • Detect Neshta Payload

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Sodinokibi/Revil sample

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Change Default File Association

1
T1042

Defense Evasion

Modify Registry

3
T1112

File Deletion

2
T1107

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Impact

Inhibit System Recovery

2
T1490

Defacement

1
T1491

Tasks