General

  • Target

    11bfa9bc7563e823048440233143c0d56894dee97d4de9d3218e4f98a4b05c86

  • Size

    161KB

  • Sample

    220604-am1m1afagp

  • MD5

    43031369548c3e6738d34b1cae9ef384

  • SHA1

    d95e7d6e64ed6df508eac2ae271e3b46ad92fa40

  • SHA256

    11bfa9bc7563e823048440233143c0d56894dee97d4de9d3218e4f98a4b05c86

  • SHA512

    01bfdd50f9893306c2864ed33e84332fce6555d6077d8dfbe7a0cf670c9da301ebdb260b7da690ae591d6c8b2a0aa3dc215bd36b9dc7a2dd00d6a6dd3d1e53a9

Malware Config

Extracted

Family

sodinokibi

Botnet

33

Campaign

370

C2

walterman.es

belofloripa.be

relevantonline.eu

k-v-f.de

spacebel.be

lexced.com

baptistdistinctives.org

bmw-i-pure-impulse.com

adaduga.info

betterce.com

line-x.co.uk

nginx.com

graygreenbiomedservices.com

denverwynkoopdentist.com

metcalfe.ca

michal-s.co.il

nxtstg.org

whoopingcrane.com

peppergreenfarmcatering.com.au

fotoslubna.com

Attributes
  • net

    true

  • pid

    33

  • prc

    thebat.exe

    visio.exe

    thunderbird.exe

    mydesktopqos.exe

    tbirdconfig.exe

    ocssd.exe

    isqlplussvc.exe

    sqlbrowser.exe

    mysqld_opt.exe

    sqlservr.exe

    xfssvccon.exe

    encsvc.exe

    dbeng50.exe

    infopath.exe

    sqlagent.exe

    mspub.exe

    excel.exe

    mydesktopservice.exe

    mysqld_nt.exe

    thebat64.exe

    msaccess.exe

    agntsvc.exe

    powerpnt.exe

    oracle.exe

    firefoxconfig.exe

    ocautoupds.exe

    outlook.exe

    ocomm.exe

    sqlwriter.exe

    sqbcoreservice.exe

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} Extension name: {EXT} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    370

Targets

    • Target

      11bfa9bc7563e823048440233143c0d56894dee97d4de9d3218e4f98a4b05c86

    • Size

      161KB

    • MD5

      43031369548c3e6738d34b1cae9ef384

    • SHA1

      d95e7d6e64ed6df508eac2ae271e3b46ad92fa40

    • SHA256

      11bfa9bc7563e823048440233143c0d56894dee97d4de9d3218e4f98a4b05c86

    • SHA512

      01bfdd50f9893306c2864ed33e84332fce6555d6077d8dfbe7a0cf670c9da301ebdb260b7da690ae591d6c8b2a0aa3dc215bd36b9dc7a2dd00d6a6dd3d1e53a9

    Score
    10/10
    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks