General

  • Target

    11d7ebfc6dd68efb6dda3a7a37c29eaf96b5e154522db9d933e7b20ca978faea

  • Size

    528KB

  • Sample

    220603-3mls3adegn

  • MD5

    f51873066eeb8bb1fb5dace075a31f9f

  • SHA1

    c6311b013a66fd5c859199db282d8608a4a0606a

  • SHA256

    11d7ebfc6dd68efb6dda3a7a37c29eaf96b5e154522db9d933e7b20ca978faea

  • SHA512

    5c5f96cb6940585fb8cfb0b7ab2a966e48e34dce0cc7519fb0612964d653230c6b3ad69294c90352ca54c968af374fb73a7b3154b330bdfcbf503021f8b39ee9

Malware Config

Extracted

Family

sodinokibi

Botnet

17

Campaign

538

C2

ocduiblog.com

littlesaints.academy

ivancacu.com

santastoy.store

julielusktherapy.com

metriplica.academy

poems-for-the-soul.ch

circlecitydj.com

manzel.tn

claudiakilian.de

perfectgrin.com

mercadodelrio.com

penumbuhrambutkeiskei.com

patriotcleaning.net

nieuwsindeklas.be

ledyoucan.com

unislaw-narty.pl

cleanroomequipment.ie

tbalp.co.uk

cincinnatiphotocompany.org

Attributes
  • net

    false

  • pid

    17

  • prc

    tbirdconfig.exe

    thebat64.exe

    sqlwriter.exe

    mysqld_nt.exe

    dbsnmp.exe

    oracle.exe

    xfssvccon.exe

    msftesql.exe

    mspub.exe

    excel.exe

    msaccess.exe

    powerpnt.exe

    onenote.exe

    sqlbrowser.exe

    visio.exe

    mydesktopqos.exe

    isqlplussvc.exe

    sqlagent.exe

    infopath.exe

    ocautoupds.exe

    steam.exe

    winword.exe

    ocssd.exe

    thebat.exe

    mysqld_opt.exe

    wordpad.exe

    sqlservr.exe

    firefoxconfig.exe

    dbeng50.exe

    sqbcoreservice.exe

    mydesktopservice.exe

    synctime.exe

    mysqld.exe

    outlook.exe

    thunderbird.exe

    agntsvc.exe

    encsvc.exe

    ocomm.exe

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} Extension name: {EXT} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    538

Targets

    • Target

      11d7ebfc6dd68efb6dda3a7a37c29eaf96b5e154522db9d933e7b20ca978faea

    • Size

      528KB

    • MD5

      f51873066eeb8bb1fb5dace075a31f9f

    • SHA1

      c6311b013a66fd5c859199db282d8608a4a0606a

    • SHA256

      11d7ebfc6dd68efb6dda3a7a37c29eaf96b5e154522db9d933e7b20ca978faea

    • SHA512

      5c5f96cb6940585fb8cfb0b7ab2a966e48e34dce0cc7519fb0612964d653230c6b3ad69294c90352ca54c968af374fb73a7b3154b330bdfcbf503021f8b39ee9

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks