General

  • Target

    cf4f738fcabfb4976ad6b6edc90f0a2627a19ba9403f08af1eae28bb0d34f4fb

  • Size

    271KB

  • Sample

    220524-w7b12adcf8

  • MD5

    2f2e89c50ae94235587c7e76da10a302

  • SHA1

    1f00830f1c4a9176e43e012a2683776f009ad021

  • SHA256

    cf4f738fcabfb4976ad6b6edc90f0a2627a19ba9403f08af1eae28bb0d34f4fb

  • SHA512

    7c302199ff71f0710142f8e2c62bb6e2a73982cab5e01f85eb11033059a5010c894810d55cf419290c2c138d005d452c995d62937306a45f96dd65b49112e5ff

Malware Config

Extracted

Family

sodinokibi

Botnet

8

Campaign

1227

C2

redctei.co

tesisatonarim.com

olry-cloisons.fr

pinthelook.com

sunsolutions.es

rentsportsequip.com

qandmmusiccenter.com

ntinasfiloxenia.gr

ronielyn.com

maryairbnb.wordpress.com

amorbellezaysalud.com

subquercy.fr

edvestors.org

inewsstar.com

motocrosshideout.com

sharonalbrightdds.com

sshomme.com

site.markkit.com.br

girlish.ae

animation-pro.co.uk

Attributes
  • net

    true

  • pid

    8

  • prc

    agntsvc

    mspub

    wordpad

    infopath

    thunderbird

    outlook

    sqbcoreservice

    xfssvccon

    sql

    oracle

    firefox

    powerpnt

    mydesktopservice

    dbsnmp

    msaccess

    visio

    isqlplussvc

    encsvc

    dbeng50

    ocautoupds

    synctime

    ocssd

    onenote

    ocomm

    thebat

    excel

    mydesktopqos

    steam

    winword

    tbirdconfig

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions ====================================== 모든 파일이 암호화되어 있습니다! {EXT} -readme.txt 찾기 및 설치 방법 따르기

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/{UID} c) If you are having difficulty purchase bitcoins, or you doubt in buying decryptor, contact to any data recovery company in your country, they will give you more guarantees and take purchase and decryption procedure on themselves. Almost all such companies heared about us and know that our decryption program work, so they can help you. Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} Extension name: {EXT} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    1227

  • svc

    sql

    svc$

    sophos

    veeam

    mepocs

    memtas

    vss

    backup

Extracted

Path

C:\4uk5631y-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion 4uk5631y. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/617AE3C4DE3A20F4 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/617AE3C4DE3A20F4 c) If you are having difficulty purchase bitcoins, or you doubt in buying decryptor, contact to any data recovery company in your country, they will give you more guarantees and take purchase and decryption procedure on themselves. Almost all such companies heared about us and know that our decryption program work, so they can help you. Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: thu8jo/1sOYygcAS9oHwquEPlVWEi2HssSvVER3ovZ3SMOE2B51758bHplahZn4s MP5wu6QUPHLN5TzIoAe7Osuushp5oX4GzcySodxcJqGGbOoQpB5M2HvsmiuWL4LG m3bN2nvt573H3N4VbQ8cSHkgQQSD8lFBB/poV9Zxn8TjbvzVViF5tG/OpejeQFxU 75Eh4JCXBBRHP2qog4LYCxNN/6uMVv1mlHG9I/PKn1m7zCPuKyp6igVDloo61HY8 MIGYTRl7BPSreIHpu9qGDvWgGu8Rd/tcLpIuV6JEq7aH6FD547gzmaUNoDT52zqk YLc8i23Mjf9IQ08WJGOP1RzsWUusuZJTuSoRe/6qcKpPwlpXF8ZJIDJMwq46WZy7 Kp/Y7ViQuUsG1ng1M5xJeRX7f27wx2I8XxHjikNVtBkMmlqa0tdPFEdSjIOjLTCJ ZVbKCGHNuFiusdR6GcTWWMp1hjV13KB4Z7EPqdkfpfjX8PUx+v65EK4dO36Dc4L1 gJrmdkFXdpox1Gx9lS05PPBLTV4ENvFQw1FRQk9Uvd3dwfQlIUiU2rAIF4xRcHY4 ggwSnxn8A/8W444ja4ENQKkiVv4hGxyX5tlP1e8CmYv+m1YlWDD3gMTRByweFeqv W42PTLOYLrs+5f5Xnv3lcBK+M7Wzpi/fQmRyXlbYpH5+a6NIgXXExcHN/quA7BZq qGlT+k2GRNUNkpAkmIZPQraxEGGWrjc34lEQ/7Ak+YWiZYyMbyBinTA3ErorcjX+ DSt+jNmQ9sbeJdYo29xy6G3+kKjLV/ciyk0aE86xMbcOPhnb9NndtW9ITWNa0BC9 wYfGNMES2raepKm1VBX3rk67Q8n3PSwDSV4LoNCyuFuylC2eL+yMrs37S2OK+vbl j/wFeykIYbscyX+K0XSVuKm9AdKOGMBqKF4X2jZlPEi8fWjtHZyhAsGQeddlEbbH WwuyMLs1/podnU1zRTO22kYyMXjsIoHw5GV9c6KSCOCkSrck3X12mlDYbC8QzbNU aY9XSgQnbEPMNZgBo9zNpP/m6S4EyMZcxRWtPy8zzLf3DcUKHetQHjZtjrMlQHZ4 CXqXEXEwjiEBTW4Jwsk4o9/KQa5KIBAYjOzCI/rnZyGEDcnAUO65TkyGUF5nh+D8 HI/saj3wyD08aAh2 Extension name: 4uk5631y ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/617AE3C4DE3A20F4

http://decryptor.top/617AE3C4DE3A20F4

Targets

    • Target

      cf4f738fcabfb4976ad6b6edc90f0a2627a19ba9403f08af1eae28bb0d34f4fb

    • Size

      271KB

    • MD5

      2f2e89c50ae94235587c7e76da10a302

    • SHA1

      1f00830f1c4a9176e43e012a2683776f009ad021

    • SHA256

      cf4f738fcabfb4976ad6b6edc90f0a2627a19ba9403f08af1eae28bb0d34f4fb

    • SHA512

      7c302199ff71f0710142f8e2c62bb6e2a73982cab5e01f85eb11033059a5010c894810d55cf419290c2c138d005d452c995d62937306a45f96dd65b49112e5ff

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Impact

Defacement

1
T1491

Tasks