General

  • Target

    42996516b6604ba136ff909d9b59d2a676a72eaafa30c729cdfaddd96b20fc83

  • Size

    164KB

  • Sample

    220201-p5xrdsaccj

  • MD5

    4903f3effb98da65c49bb9591c16615d

  • SHA1

    d53e85991420c1475385babd72d31ee77faefc6d

  • SHA256

    42996516b6604ba136ff909d9b59d2a676a72eaafa30c729cdfaddd96b20fc83

  • SHA512

    454b8a5f3528ce77d993b84ccd0df7b8f0843a6a47516b1aa13fe6cbb79d1853646e03c7c9663266df154fd464f594d41be1e392d0c8c3dd676e4348e5149880

Malware Config

Extracted

Family

sodinokibi

Botnet

23

Campaign

2418

C2

nalliasmali.net

funworx.de

lapponiasafaris.com

frameshift.it

olry-cloisons.fr

marcandy.com

startuplive.org

annenymus.com

circuit-diagramz.com

mursall.de

boloria.de

metallbau-hartmann.eu

test-teleachat.fr

adaduga.info

iexpert99.com

ced-elec.com

goddardleadership.org

advanced-removals.co.uk

jaaphoekzema.nl

fann.ru

Attributes
  • net

    true

  • pid

    23

  • prc

    sqbcoreservice

    mspub

    synctime

    vsnapvss

    agntsvc

    ocssd

    DellSystemDetect

    dbsnmp

    outlook

    isqlplussvc

    msaccess

    steam

    mydesktopservice

    benetns

    tbirdconfig

    vxmon

    sql

    visio

    VeeamNFSSvc

    VeeamTransportSvc

    beserver

    encsvc

    thebat

    EnterpriseClient

    bedbh

    dbeng50

    firefox

    mydesktopqos

    infopath

    onenote

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} Extension name: {EXT} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    2418

  • svc

    VSNAPVSS

    MVArmor

    BackupExecAgentBrowser

    backup

    MSSQL

    VeeamTransportSvc

    BackupExecManagementService

    BackupExecJobEngine

    BackupExecVSSProvider

    MSExchange$

    MSExchange

    vss

    svc$

    BackupExecDiveciMediaService

    ARSM

    sql

    bedbg

    MVarmor64

    AcrSch2Svc

    AcronisAgent

    CAARCUpdateSvc

    BackupExecAgentAccelerator

    BackupExecRPCService

    stc_raw_agent

    PDVFSService

    veeam

    CASAD2DWebSvc

    WSBExchange

    sophos

    mepocs

Targets

    • Target

      42996516b6604ba136ff909d9b59d2a676a72eaafa30c729cdfaddd96b20fc83

    • Size

      164KB

    • MD5

      4903f3effb98da65c49bb9591c16615d

    • SHA1

      d53e85991420c1475385babd72d31ee77faefc6d

    • SHA256

      42996516b6604ba136ff909d9b59d2a676a72eaafa30c729cdfaddd96b20fc83

    • SHA512

      454b8a5f3528ce77d993b84ccd0df7b8f0843a6a47516b1aa13fe6cbb79d1853646e03c7c9663266df154fd464f594d41be1e392d0c8c3dd676e4348e5149880

    Score
    8/10
    • Sets service image path in registry

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks