General

  • Target

    6d8c7597bee66d3974681089805bd543f4f1b9c8fc778e939ad8a39c35456c78

  • Size

    164KB

  • Sample

    220124-cak3wshhbk

  • MD5

    2adb292a5b01999c1c557906c0c0cfe9

  • SHA1

    255a6fe6d6f5896044accf33d851ad6d567950b5

  • SHA256

    6d8c7597bee66d3974681089805bd543f4f1b9c8fc778e939ad8a39c35456c78

  • SHA512

    c18959881eb5129823e790857607c26cbace28ba0dbf1e49728d2e3978226f70251422eb9b7781fe21e5a9350e85c41abeef32545840bd519e5e72f92d5bfa6d

Score
10/10

Malware Config

Extracted

Family

sodinokibi

Botnet

39

Campaign

1100

C2

leopoldineroux.com

agencewho-aixenprovence.fr

uncensoredhentaigif.com

housesofwa.com

hoteltantra.com

peninggibadan.co.id

dieetuniversiteit.nl

haard-totaal.nl

mesajjongeren.nl

wirmuessenreden.com

dreamvoiceclub.org

solidhosting.nl

adabible.org

ledyoucan.com

memphishealthandwellness.com

airserviceunlimited.com

lapponiasafaris.com

der-stempelking.de

chris-anne.com

inewsstar.com

Attributes
  • net

    true

  • pid

    39

  • prc

    outlook

    synctime

    thunderbird

    excel

    tbirdconfig

    msaccess

    onenote

    wordpa

    powerpnt

    steam

    sqbcoreservice

    xfssvccon

    firefox

    oracle

    agntsvc

    visio

    ocssd

    ocautoupds

    mydesktopservice

    mspub

    mydesktopqos

    encsvc

    dbsnmp

    infopath

    thebat

    isqlplussvc

    sql

    ocomm

    winword

    dbeng50

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} Extension name: {EXT} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    1100

  • svc

    svc$

    mepocs

    memtas

    veeam

    sql

    vss

    backup

    sophos

Targets

    • Target

      6d8c7597bee66d3974681089805bd543f4f1b9c8fc778e939ad8a39c35456c78

    • Size

      164KB

    • MD5

      2adb292a5b01999c1c557906c0c0cfe9

    • SHA1

      255a6fe6d6f5896044accf33d851ad6d567950b5

    • SHA256

      6d8c7597bee66d3974681089805bd543f4f1b9c8fc778e939ad8a39c35456c78

    • SHA512

      c18959881eb5129823e790857607c26cbace28ba0dbf1e49728d2e3978226f70251422eb9b7781fe21e5a9350e85c41abeef32545840bd519e5e72f92d5bfa6d

    Score
    6/10
    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks