Analysis

  • max time kernel
    39s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    07-07-2022 21:10

General

  • Target

    43fcb23dcdaf6af29a509abd0b9c2ef39de60c7b1f54e96ad5c9cf217e1440d4.exe

  • Size

    657KB

  • MD5

    775e871065821f70c34594acd97b2cc8

  • SHA1

    e2b507e5131eb04525bd6aea5663937d99191743

  • SHA256

    43fcb23dcdaf6af29a509abd0b9c2ef39de60c7b1f54e96ad5c9cf217e1440d4

  • SHA512

    e9e763bff50eb37666aecad31dc301d85df8dbb46595d793ba2264d2e48f18f6319bdeff224680c3f2f89b771d9f91fc19da1209c68764e63bfb449a9c63222c

Malware Config

Extracted

Family

sodinokibi

Botnet

7

Campaign

3

C2

deduktia.fi

otpusk.zp.ua

smartworkplaza.com

abulanov.com

reputation-medical.online

triplettagaite.fr

motocrosshideout.com

gosouldeep.com

kausette.com

furland.ru

katherinealy.com

floweringsun.org

professionetata.com

grancanariaregional.com

hawthornsretirement.co.uk

leadforensics.com

web865.com

mariamalmahdi.com

mslp.org

zaczytana.com

Attributes
  • net

    true

  • pid

    7

  • prc

    mysql.exe

  • ransom_oneliner

    You are infected! Read {EXT}-HOW-TO-DECRYPT.txt!

  • ransom_template

    --=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} Extension name: {EXT} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    3

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\43fcb23dcdaf6af29a509abd0b9c2ef39de60c7b1f54e96ad5c9cf217e1440d4.exe
    "C:\Users\Admin\AppData\Local\Temp\43fcb23dcdaf6af29a509abd0b9c2ef39de60c7b1f54e96ad5c9cf217e1440d4.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1276

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1276-54-0x0000000076C01000-0x0000000076C03000-memory.dmp

    Filesize

    8KB

  • memory/1276-55-0x0000000000400000-0x00000000004AA000-memory.dmp

    Filesize

    680KB

  • memory/1276-57-0x0000000000250000-0x0000000000258000-memory.dmp

    Filesize

    32KB

  • memory/1276-59-0x0000000002E60000-0x0000000002EFF000-memory.dmp

    Filesize

    636KB

  • memory/1276-60-0x00000000030F0000-0x000000000321D000-memory.dmp

    Filesize

    1.2MB

  • memory/1276-61-0x0000000000530000-0x000000000054F000-memory.dmp

    Filesize

    124KB

  • memory/1276-62-0x0000000003470000-0x0000000003579000-memory.dmp

    Filesize

    1.0MB

  • memory/1276-64-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/1276-63-0x0000000000270000-0x000000000027A000-memory.dmp

    Filesize

    40KB

  • memory/1276-65-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB