General

  • Target

    4fb1ee653ab61e7d878a0ccdd62f8cd85b67bc4c51f145d6b5e822c41e2f00c5

  • Size

    164KB

  • Sample

    220124-cjx4taaah6

  • MD5

    c3f9726a402dab37dfade6f8ac43f22a

  • SHA1

    3e8363fb1fb4025aba344e9e3b6683f97ded19f1

  • SHA256

    4fb1ee653ab61e7d878a0ccdd62f8cd85b67bc4c51f145d6b5e822c41e2f00c5

  • SHA512

    8322d2e246eda908bf6d895418e0cd41cec7e25bddef7ea3be16a86525f6a8abb40abe2394f4855fca51f73fd14d161a31cc3292dc34ba932b1a482d83068c7e

Score
10/10

Malware Config

Extracted

Family

sodinokibi

Botnet

28

Campaign

2892

C2

finsahome.co.uk

cleanroomequipment.ie

fann.ru

akwaba-safaris.com

stathmoulis.gr

3daywebs.com

min-virksomhed.dk

pisofare.co

lesyeuxbleus.net

kosten-vochtbestrijding.be

switch-made.com

the5thquestion.com

mamajenedesigns.com

scentedlair.com

collegetennis.info

reygroup.pt

slotspinner.com

clinic-beethovenstrasse-ag.ch

ykobbqchicken.ca

lyricalduniya.com

Attributes
  • net

    true

  • pid

    28

  • prc

    winword

    sqbcoreservice

    firefox

    isqlplussvc

    mydesktopservice

    oracle

    visio

    veeam

    synctime

    powerpnt

    thunderbird

    agntsvc

    thebat

    wordpa

    ocomm

    steam

    tbirdconfig

    msaccess

    ocssd

    excel

    mydesktopqos

    sql$

    mspub

    dbeng50

    ocautoupds

    encsvc

    infopath

    dbsnmp

    onenote

    xfssvccon

    outlook

  • ransom_oneliner

    Sir, its just a business. Just read and follow all instructions and you get your data back. Find {EXT}-readme.txt and follow instructions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} Extension name: {EXT} -------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!! A system of morality which is based on relative emotional values is a mere illusion, a thoroughly vulgar conception which has nothing sound in it and nothing true. Socrates

  • sub

    2892

  • svc

    svc$

    veeam

    altaro

    backup

    memtas

    sql

    mepocs

    vss

    sophos

Targets

    • Target

      4fb1ee653ab61e7d878a0ccdd62f8cd85b67bc4c51f145d6b5e822c41e2f00c5

    • Size

      164KB

    • MD5

      c3f9726a402dab37dfade6f8ac43f22a

    • SHA1

      3e8363fb1fb4025aba344e9e3b6683f97ded19f1

    • SHA256

      4fb1ee653ab61e7d878a0ccdd62f8cd85b67bc4c51f145d6b5e822c41e2f00c5

    • SHA512

      8322d2e246eda908bf6d895418e0cd41cec7e25bddef7ea3be16a86525f6a8abb40abe2394f4855fca51f73fd14d161a31cc3292dc34ba932b1a482d83068c7e

    Score
    6/10
    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks