General

  • Target

    2fa7b5a60cd1a8b67b09a13e09529fe399d2f3f62c5591badaccf5d3a052289f

  • Size

    164KB

  • Sample

    220124-csezlaacfn

  • MD5

    5fa2e3adcd15792d66654130fcf47744

  • SHA1

    1df8a5fb27139fb5ca5cf0f5921e4e9808ee97a1

  • SHA256

    2fa7b5a60cd1a8b67b09a13e09529fe399d2f3f62c5591badaccf5d3a052289f

  • SHA512

    41ddd0647a56174e9953322236892a4b6db133503bf6421b6dcfa24f103f584be0e6000fe574e69293468b72e4191bd95a18dbaa9add6fc11ce20b022c0aa37e

Score
10/10

Malware Config

Extracted

Family

sodinokibi

Botnet

28

Campaign

1432

C2

wasnederland.nl

radishallgood.com

burg-zelem.de

loparnille.se

hiddensee-buhne11.de

qandmmusiccenter.com

heimdalbygg.no

michaelfiegel.com

gaearoyals.com

annenymus.com

customroasts.com

agenceassemble.fr

mercadodelrio.com

krishnabrawijaya.com

cotton-avenue.co.il

alaskaremote.com

livedeveloper.com

adabible.org

palema.gr

janellrardon.com

Attributes
  • net

    true

  • pid

    28

  • prc

    dbeng50

    ocautoupds

    ocomm

    firefox

    onenote

    outlook

    thebat

    sql

    mydesktopservice

    powerpnt

    winword

    mspub

    agntsvc

    sqbcoreservice

    oracle

    excel

    msaccess

    isqlplussvc

    xfssvccon

    steam

    ocssd

    synctime

    thunderbird

    wordpa

    visio

    infopath

    tbirdconfig

    mydesktopqos

    dbsnmp

    encsvc

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}_Wannadie.txt and follow instructions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} Extension name: {EXT} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    1432

  • svc

    sql

    backup

    sophos

    memtas

    mepocs

    vss

    veeam

    svc$

Targets

    • Target

      2fa7b5a60cd1a8b67b09a13e09529fe399d2f3f62c5591badaccf5d3a052289f

    • Size

      164KB

    • MD5

      5fa2e3adcd15792d66654130fcf47744

    • SHA1

      1df8a5fb27139fb5ca5cf0f5921e4e9808ee97a1

    • SHA256

      2fa7b5a60cd1a8b67b09a13e09529fe399d2f3f62c5591badaccf5d3a052289f

    • SHA512

      41ddd0647a56174e9953322236892a4b6db133503bf6421b6dcfa24f103f584be0e6000fe574e69293468b72e4191bd95a18dbaa9add6fc11ce20b022c0aa37e

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks