General

  • Target

    578e1b00157447f99716b646af6b0c33d0f6c32257a19376d6cc9d003ff0fba1

  • Size

    164KB

  • Sample

    220201-p5qm3saec3

  • MD5

    722e15d85827d3ac13e56e8108688012

  • SHA1

    cab935a24d7d0ea7e8d93851f7ea94ab9bccfc34

  • SHA256

    578e1b00157447f99716b646af6b0c33d0f6c32257a19376d6cc9d003ff0fba1

  • SHA512

    59e24cf313db4413f44f16a8276d072f43402e718c25e1d00e81ddc69a1937473cfd1902c320bc9175d75a0d43a53ab3e971b8447ec1cf9cf9aa3aa536464273

Score
10/10

Malware Config

Extracted

Family

sodinokibi

Botnet

23

Campaign

2418

C2

centuryvisionglobal.com

alabamaroofingllc.com

fitnessblenderstory.com

andrealuchesi.it

stressreliefadvice.com

aquacheck.co.za

p-ride.live

martha-frets-ceramics.nl

wg-heiligenstadt.de

brownswoodblog.com

voice2biz.com

mariamalmahdi.com

advance-refle.com

galatee-couture.com

acornishstudio.co.uk

maxcube24.com.ua

3daywebs.com

sprintcoach.com

newonestop.com

speakaudible.com

Attributes
  • net

    true

  • pid

    23

  • prc

    raw_agent_svc

    dbsnmp

    synctime

    mydesktopqos

    mspub

    encsvc

    VeeamNFSSvc

    bedbh

    excel

    VeeamDeploymentSvc

    tbirdconfig

    sqbcoreservice

    DellSystemDetect

    EnterpriseClient

    ocomm

    msaccess

    winword

    CagService

    ocautoupds

    wordpad

    oracle

    vxmon

    firefox

    isqlplussvc

    ocssd

    beserver

    thunderbird

    VeeamTransportSvc

    outlook

    pvlsvr

    sql

    dbeng50

    benetns

    xfssvccon

    agntsvc

    thebat

    powerpnt

    vsnapvss

    mydesktopservice

    bengien

    steam

    infopath

    visio

    onenote

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} Extension name: {EXT} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    2418

  • svc

    CASAD2DWebSvc

    PDVFSService

    CAARCUpdateSvc

    BackupExecAgentBrowser

    MSSQL$

    BackupExecJobEngine

    MVArmor

    WSBExchange

    sql

    MVarmor64

    MSExchange

    BackupExecManagementService

    VeeamDeploymentService

    stc_raw_agent

    BackupExecDiveciMediaService

    memtas

    VeeamNFSSvc

    vss

    AcrSch2Svc

    backup

    MSSQL

    VSNAPVSS

    BackupExecAgentAccelerator

    bedbg

    MSExchange$

    mepocs

    veeam

    sophos

    VeeamTransportSvc

    ARSM

    BackupExecRPCService

    svc$

    BackupExecVSSProvider

    AcronisAgent

Targets

    • Target

      578e1b00157447f99716b646af6b0c33d0f6c32257a19376d6cc9d003ff0fba1

    • Size

      164KB

    • MD5

      722e15d85827d3ac13e56e8108688012

    • SHA1

      cab935a24d7d0ea7e8d93851f7ea94ab9bccfc34

    • SHA256

      578e1b00157447f99716b646af6b0c33d0f6c32257a19376d6cc9d003ff0fba1

    • SHA512

      59e24cf313db4413f44f16a8276d072f43402e718c25e1d00e81ddc69a1937473cfd1902c320bc9175d75a0d43a53ab3e971b8447ec1cf9cf9aa3aa536464273

    Score
    6/10
    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks