General

  • Target

    19cd4deb02d2b5abaeed2ea37ed255ddc078c3a054317b7c4c7430ce7526e2a9

  • Size

    179KB

  • Sample

    220608-f15f1abagp

  • MD5

    b471b0c915a5762839b76a5a31e74841

  • SHA1

    650aa1e536e8082479cbf956d38881260c05868b

  • SHA256

    19cd4deb02d2b5abaeed2ea37ed255ddc078c3a054317b7c4c7430ce7526e2a9

  • SHA512

    8e12ff4eca0e638673b15a8c2de9fd696c093316051fb31571f02c2739cf69e6dc3037368e9006371b0c85eba532a7b46cbc402be7e9624866cbbcc2dacf376c

Malware Config

Extracted

Family

sodinokibi

Botnet

19

Campaign

312

C2

ikadomus.com

publicompserver.de

citydogslife.com

centuryvisionglobal.com

tramadolhealth.com

designimage.ae

carsten.sparen-it.de

animalfood-online.de

lovcase.com

natturestaurante.com.br

comoserescritor.com

acornishstudio.co.uk

bumbipdeco.site

bookingwheel.com

awag-blog.de

frimec-international.es

ciga-france.fr

brisbaneosteopathic.com.au

dennisverschuur.com

keyboardjournal.com

Attributes
  • net

    true

  • pid

    19

  • prc

    sqlwriter

    wordpad

    mysqld

    onenote

    agntsvc

    xfssvccon

    mspub

    sqbcoreservice

    mydesktopservice

    sqlagent

    ocomm

    dbeng50

    isqlplussvc

    steam

    oracle

    thebat

    ocautoupds

    mysqld_opt

    mysqld_nt

    sqlbrowser

    infopath

    msaccess

    sqlservr

    firefoxconfig

    winword

    powerpnt

    excel

    synctime

    ocssd

    dbsnmp

    tbirdconfig

    visio

    outlook

    thebat64

    thunderbird

    mydesktopqos

    encsvc

    msftesql

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} Extension name: {EXT} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    312

  • svc

    mepocs

    svc$

    sql

    sophos

    vss

    backup

    memtas

    veeam

Extracted

Path

C:\39shjl02-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion 39shjl02. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/24E90B50D1F826E1 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/24E90B50D1F826E1 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: iwtTVQamS+zRxcLr7gIusFVZ/fgswmldoAVdFNNGRJvsWZ/Z7H5Ec/fX6D9DdFAg m+tOkb4O5km7+adqUASGqP/TjFT6Yu5P4yiur4DV7DDaBfz94YXGbV85HCaTNVJX 21D7vRw5BatrYojya4fBJJ4f85TQqzujm5chRrgsTFvkepSZ8cEkiNnUE2WPg8YV 7vJBwT2/nuUT5vSAfPxD8APxf9igf+7H1eUFidemU7kvI8Sqv1KZGdIyIown8o4x yKNJSs8mmxq+TGfK8VmuHLbJT1Lp9pN83QykaCdk/zZokGI6S9bduQ/3uTJ8uK3H mwLvMMLRH1YPVLtglA1eoxlshVPnEhqCZwFFtYFOQc1++FC8ZAJLAt64vrZrBTP+ moBWOER88x+XTbQuX4kj6o1CIsSBxiBJlMACuUoed3MHehkw3sMMk8eOWMJApTNi /tU7VdAvo5OymusY69wEQTFTitH4RUQUQkZJRQebR17/wa8jhiqAiiCvPhZ2vXzc 2I8LzzcR48CasFbqrgvBioufyzeZnSAi+6vM1E7qsjhv1wLOY2m9T8vI00/bdZ3f 0WL/3Gatd1MKI/WEV0PIlhocrrKSTJf/rzurFVd+4No78PDTDFXsZYtub1wfGTHs 81xmLrP50rroe6l8xGU1eMYnSh5ROd/QB9CLqQX3MRshaSy5N5weqmUgS/tLx1hQ FL5v2aKT4aClIrdoFX7dACHSvYLrrT+5LCbapCVXgy8xflBWG3tOwaTiwnAIcUm9 ny3/tzx1fd6estBpq5owTNtc9IqTDB0E1Zj+syxxdAI9qx2Zgm8D8mFXz/T5A4fI AJET/JmydBU+lWOo8mWjPusP0ss22RQBjer5u4jK3Ig+3/hoOQh6itEkX/bNJdRS 5RXuYFc+t5Gh1mjvr4s5OBVu5M3qis0p7kigE3YGLAi92D3HbNZKYyPEqiP6fpQt o8uDcMQBK0c5rhCJKipemecafXQNt/kPig2vJRCwy2NRRgguOd3xgeI418tQl7Rn 9LLe+L62qsQjg21qTyYccc/GkF7OOCW07f82cVyXOtDa4iRTAqx1kpVrvciJ8X1E O7IUkCfk7GBPLVkHpN/LPaVfezk8Y47G4zAo1/4898z17gYToESYaji87ebsTY71 u6KXwCLcsA5oKEIY Extension name: 39shjl02 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/24E90B50D1F826E1

http://decryptor.top/24E90B50D1F826E1

Targets

    • Target

      19cd4deb02d2b5abaeed2ea37ed255ddc078c3a054317b7c4c7430ce7526e2a9

    • Size

      179KB

    • MD5

      b471b0c915a5762839b76a5a31e74841

    • SHA1

      650aa1e536e8082479cbf956d38881260c05868b

    • SHA256

      19cd4deb02d2b5abaeed2ea37ed255ddc078c3a054317b7c4c7430ce7526e2a9

    • SHA512

      8e12ff4eca0e638673b15a8c2de9fd696c093316051fb31571f02c2739cf69e6dc3037368e9006371b0c85eba532a7b46cbc402be7e9624866cbbcc2dacf376c

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Impact

Defacement

1
T1491

Tasks