General

  • Target

    5fac1a1b95c5esvhost.exe

  • Size

    117KB

  • Sample

    220307-atj9laacdr

  • MD5

    a9f731de650ee1ba0ef91e1386ac2dad

  • SHA1

    60f6ad3ec25581bb53dac56634cff820e0d6fd81

  • SHA256

    5966c25dc1abcec9d8603b97919db57aac019e5358ee413957927d3c1790b7f4

  • SHA512

    248f4e1297ab1e00fda37dd546a7f173ef5d0a0d2fd656adba97f8f07dfa0e1e27d9a7cc4cb55f3b451f7e5ce1ff7cf569cd3da42c91d1ed1bc16a6e93c9c2d0

Malware Config

Extracted

Family

sodinokibi

Botnet

$2a$10$jic4PWjsOW3XAFg6jrtWU.4s2YBeZxLBwNhXoxP2z1e6MThWCdpHu

Campaign

5223

C2

urmasiimariiuniri.ro

thedresserie.com

hotelsolbh.com.br

theletter.company

directwindowco.com

hugoversichert.de

ino-professional.ru

bogdanpeptine.ro

d2marketing.co.uk

boisehosting.net

girlillamarketing.com

romeguidedvisit.com

maineemploymentlawyerblog.com

sachnendoc.com

pomodori-pizzeria.de

vesinhnha.com.vn

restaurantesszimmer.de

toreria.es

homesdollar.com

caribdoctor.org

Attributes
  • net

    true

  • pid

    $2a$10$jic4PWjsOW3XAFg6jrtWU.4s2YBeZxLBwNhXoxP2z1e6MThWCdpHu

  • prc

    oracle

    mspub

    outlook

    sql

    tbirdconfig

    msaccess

    powerpnt

    sqbcoreservice

    mydesktopservice

    thebat

    visio

    dbeng50

    ocomm

    ocautoupds

    isqlplussvc

    encsvc

    mydesktopqos

    thunderbird

    xfssvccon

    dbsnmp

    winword

    synctime

    infopath

    wordpad

    excel

    onenote

    agntsvc

    ocssd

    steam

    firefox

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    5223

  • svc

    backup

    sophos

    memtas

    veeam

    vss

    svc$

    sql

    mepocs

Extracted

Path

C:\02v43f4e7-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 02v43f4e7. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/68AAAA057BA4DA9E 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/68AAAA057BA4DA9E Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: Tr6vi8wSj+pxGPegIRkd/sTkqXm1UThzkMdif2B85sWrsJezA8gXCeHE9FDz3Zbj 7m2y855/aTVcVBZPIJty558EOWXL6zoWpveMr/1BOpjl37VUcE4NLWNuLB4SEsDh vnTqUaDjOkqdnQFE8cL2JSKGTJm+biBUhE1YN+7+yWMKb81VbxsDc29FYUiIzkny KjHVjyqf/NL+i6fk/T+eRNREgNI/6EM5dMBlXGAqm7e7YL+V99mWVuWTtbmt0BYC jTfiwY5/JCicC50eO5YzmRZPGdQMj24NH8yBMLc8X0jhRxDu+88SSaFQMKAQcYRv SemCXv96G/0f2UqcOsHanzDGp6+3+uKG575rq6++fjuZ8RdcuiMGxy/JBr1cj0QH FXHPTnA/YOC98D6wrjeHkzjwJWTqXSE96+lpLXNtZd9Y2aI5NFs2HrNNhya48iXN hmRif7MGXEZLUtNyj5QNDzoM+WfUNTUjiPFD+RDvGs0YrkOnMUws8XeVRkp/UKtL zLoBss8aIiBwFzNERaxDgPW8SCITYolqTDSGZRjW4nFJge8a6nCZBkoR9EAhVoJJ sEp8FnsCB7RyUGoGyN1KKu2Azp4o3a2/IPzMbvUog/KuNJ6ExDQjcH1MSNW38SZU jPoTLYEM1mxLwXS7VKXwOGFPVNu24k+dG/PXupVqXQ1OiE5yDvf6MHd+ZwiCUXMU 7dtNiGeysEbMo9soYVN4kOzH7ObvSf9etHH6KSNqlOuFAxh0d2w47QW2tn0ozFnU EvANd94yH9ntTb8eIV5txKcPuILCnsc9XqrcOIeSbvIgqtxs5aIr8gWn3MpbI0t9 HnkQwpWvgJp43I/buXLHXEghxITVgn009cqKA6CoWKiZT1fXO6Rd684XraQLbT5q rfn/cTHYVkIbS+WJsabUK94BtlQzWuQpWPkKgX8iVfu96WuMitn9NkbACcXMmyY5 Jv4CHllK8+00P1woBBL53tgXs/QChAmry7Oa2RSt0zEX2+Xi6WAkR1YkUeCzzB9Q lLDYl2C8Oi072fz8uzsZgayyhiDEFKnBqOGwldXQHv4uJo0TuBKMJFX1bZV7E6Mz dstnxU4BcllCixbXFfsF4scV5+MsobPzkqTlx4GiMNOzML+xIE26ZVZcaWBTlz3/ m6lhJiE3oybJFmSukQbOhSH/iSZKDiUqIj1oklmXtU4p3WCSgiFe3pKGnfACCsDi pY9EWoTIXNrTCZe9Dbwu9/iV0YfHJ8T83SJ69No2ah5bknpxt8ur0SAhE9SjCwhn K0bVIxczfs3sMgORUEOvbrmr+7+5vvDSDXRoguRR ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/68AAAA057BA4DA9E

http://decryptor.cc/68AAAA057BA4DA9E

Targets

    • Target

      5fac1a1b95c5esvhost.exe

    • Size

      117KB

    • MD5

      a9f731de650ee1ba0ef91e1386ac2dad

    • SHA1

      60f6ad3ec25581bb53dac56634cff820e0d6fd81

    • SHA256

      5966c25dc1abcec9d8603b97919db57aac019e5358ee413957927d3c1790b7f4

    • SHA512

      248f4e1297ab1e00fda37dd546a7f173ef5d0a0d2fd656adba97f8f07dfa0e1e27d9a7cc4cb55f3b451f7e5ce1ff7cf569cd3da42c91d1ed1bc16a6e93c9c2d0

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks