General

  • Target

    3a39576496e6e961af1f0f2865217f87c5abffd58fe0ae038e93d697b162c7dc

  • Size

    165KB

  • Sample

    220701-dcfrmaghfr

  • MD5

    d0402e1da85d662c7a97c892abc2b637

  • SHA1

    a463feb96936e880c923b46afb0226acd3a28b8a

  • SHA256

    3a39576496e6e961af1f0f2865217f87c5abffd58fe0ae038e93d697b162c7dc

  • SHA512

    e919abfb4136e7f2ee466598368709d8b2cbfc5664a1f0412fbc57d76c01d317db06a8c512dcc8d5815f28438f9b7a1bbfabf547f4cd219afffb8200274ebdc7

Malware Config

Extracted

Family

sodinokibi

Botnet

48

Campaign

2839

C2

fotoeditores.com

lisa-poncon.fr

loysonbryan.com

levencovka.ru

dierenambulancealkmaar.nl

apogeeconseils.fr

xn--ziinoapte-6ld.ro

mrkluttz.com

larchwoodmarketing.com

cymru.futbol

afbudsrejserallinclusive.dk

towelroot.co

frimec-international.es

fluzfluzrewards.com

liepertgrafikweb.at

sppdstats.com

happylublog.wordpress.com

kelsigordon.com

biodentify.ai

bratek-immobilien.de

Attributes
  • net

    false

  • pid

    48

  • prc

    pvlsvr

    dbsnmp

    VeeamDeploymentSvc

    dbeng50

    beserver

    bengien

    powerpnt

    bedbh

    EnterpriseClient

    ocomm

    outlook

    thunderbird

    thebat

    isqlplussvc

    steam

    infopath

    tbirdconfig

    xfssvccon

    sql

    onenote

    mydesktopservice

    DellSystemDetect

    visio

    sqbcoreservice

    msaccess

    ocssd

    raw_agent_svc

    oracle

    vxmon

    excel

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    2839

  • svc

    stc_raw_agent

    BackupExecAgentAccelerator

    AcrSch2Svc

    vss

    backup

    PDVFSService

    VSNAPVSS

    VeeamDeploymentService

    sophos

    ARSM

    BackupExecVSSProvider

    memtas

    svc$

    MSSQL$

    BackupExecJobEngine

    VeeamTransportSvc

    VeeamNFSSvc

    mepocs

    BackupExecAgentBrowser

    MSSQL

    CAARCUpdateSvc

    CASAD2DWebSvc

    BackupExecManagementService

    veeam

    BackupExecRPCService

    MSExchange

    MVarmor64

    WSBExchange

    sql

    AcronisAgent

Extracted

Path

C:\cvy8251-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension cvy8251. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F11F770EFF12251C 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/F11F770EFF12251C Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: h5LEebGua9ZkFNPF2K+OS7l9E+MRYZR+z3kyaR/KHanvImrboxAUrQgTm7QXYHLt Lb7R0UgCxeQ5wjHpzHbvTAw374F4ARxhck+PHsJTEM38Gkf+LxGXkK6Hp2hsQ3ed nF4Px+gcMtOUzSs6rx46FvosPkBLnoQlLsT6oOH+GtHgmSyHZvFW7Ie/xKog8wSS w+55E7FzFkhZPVg8T+I4MGY7q6Sj+/03w/eVvCeqxZpYzmSn1C3EFFT/XDYbRPV6 0RFTdA0e+Cs9BZJWyJNU5RFaxF6hpm5evN1KRbYibScVj+3MRFj8Ap7IotICtGCv a2xA3+Hb2jTDSCVhDVvAJ3lwn7Dn03C+5xmrlr2i4KGMBxeQjYlKj31KNqhjqUGW K6LJKpEcQb1dkkGV98dBUGtQa7Srzq9ByqcrDu1/Z/4X4V1jqCbnIen1QPHcjTEt kv0QXjPjal+b86kcI4sHpG3J/RWY3/HSkJBdgdguRqmrxwk4SUkYEygYCK0JDZe6 CbQtuLihlcGAjVWZYBD5Z4VMxgToA2nzPkjEVli5gbHG+DZ5bG1FzRyA/9/L7vIn v+jKWNynoIJ62TL5D2290rAQ+4iJxulaHqZnmxpIpmH2BQe9ICa+3CJa6Jrt96Qd bSSA5QG2Xk/QZ/OMQ3JnxP5GZDLDb2yiVJK6tzrXlb1kFRVP1TNCp08RI5zWXROT +H+ScECdXADVsZLA3sr6zbu81U39Z8OOF2IOjogUHBXQUdN5dYZXA/cMOaUo7zKD oS13YvegfyknFB9DCrMEIZZ+ao9TzSl1QtD3e1PqluWeanFmUMUvp8/Iv1k8vOGI qV3/fOQBd7XvkumM4vLdXXsqEtkVwrYBVbhlcZjdb5VCfn3iRYZo6hicSeRFQaSb zW4VLPSETcJ6X01mcfbwnaQWQlqqU0fp8g5mJwM1fgSfEikK2DLIQlylmKGnQBsC qJGeyZ37Jtv9Y3E8wGhpOGvVVT2I3sWQc88I2eUVHRiY8tek6jJ9ehibuGAiiUcH atP66wna4hq8sh7yd33hiGmiKiGGETpKzbIBvLMt5M2DAcZW7yfkyD3wU+RcuaxD zXvzWpS4k5iTIf9YjkJ4erL3HcrLvRv4mRyf9NvJvbnqfOBPON2iKR2xEhuZKJC9 NPXoT7e14Cnq3IwU ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F11F770EFF12251C

http://decryptor.cc/F11F770EFF12251C

Targets

    • Target

      sample

    • Size

      165KB

    • MD5

      46357f434f7a6af45d039812360c5fb4

    • SHA1

      413637aa0d885aa3f35aef237d04c549d74b1d89

    • SHA256

      23d96b2a01d190a2146849c6cfe59fea9f3c6c6a8f71367dacaf89d3fa1ac51c

    • SHA512

      b48c571d0bc28eae58426eebee334baa49a78eb6f19a2efc31997233cd97caa914356657980222e0acf9eb982b45978ab103168c11f5a5964edce628816b3089

    Score
    10/10
    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks