General

  • Target

    PORT.bin

  • Size

    164KB

  • Sample

    220708-lcf2dsdcb3

  • MD5

    6268478bf01dc3eacfa23372ca8b59fa

  • SHA1

    f497026449bef302c235a1749ede57e7a077e159

  • SHA256

    b5e73c65a92abd6d8ea6040739e6b71a207035f1517f3813c56fbac937b8ff06

  • SHA512

    94ed316419f5350a845f4a988cf7b74703486fab2ba7ad0652f7280370915d8685d44447a59e8fe1f133d3923a1e929a96fe659a1b69202aae619193048345e6

Malware Config

Extracted

Family

sodinokibi

Botnet

48

Campaign

2699

C2

onlinemarketingsurgery.co.uk

skinkeeper.li

metroton.ru

fta-media.com

skolaprome.eu

carolynfriedlander.com

fotoslubna.com

stressreliefadvice.com

condormobile.fr

michal-s.co.il

andrealuchesi.it

1deals.com

hawthornsretirement.co.uk

gatlinburgcottage.com

voice2biz.com

enews-qca.com

thenalpa.com

modamarfil.com

primemarineengineering.com

internestdigital.com

Attributes
  • net

    false

  • pid

    48

  • prc

    mydesktopqos

    pvlsvr

    tbirdconfig

    agntsvc

    isqlplussvc

    vxmon

    CagService

    VeeamDeploymentSvc

    benetns

    winword

    ocomm

    firefox

    steam

    powerpnt

    dbeng50

    bengien

    visio

    mydesktopservice

    bedbh

    DellSystemDetect

    mspub

    thebat

    infopath

    encsvc

    synctime

    ocssd

    dbsnmp

    sql

    xfssvccon

    EnterpriseClient

    raw_agent_svc

    outlook

    thunderbird

    onenote

    ocautoupds

    VeeamTransportSvc

    wordpad

    msaccess

    VeeamNFSSvc

    vsnapvss

    sqbcoreservice

    excel

    beserver

    oracle

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    2699

  • svc

    MVarmor64

    backup

    memtas

    VSNAPVSS

    WSBExchange

    svc$

    MVArmor

    veeam

    bedbg

    BackupExecAgentBrowser

    BackupExecDiveciMediaService

    BackupExecVSSProvider

    MSExchange

    sophos

    AcrSch2Svc

    VeeamDeploymentService

    CAARCUpdateSvc

    PDVFSService

    BackupExecRPCService

    MSExchange$

    BackupExecJobEngine

    vss

    AcronisAgent

    MSSQL$

    stc_raw_agent

    VeeamNFSSvc

    BackupExecManagementService

    ARSM

    BackupExecAgentAccelerator

    VeeamTransportSvc

    MSSQL

    mepocs

    CASAD2DWebSvc

    sql

Extracted

Path

C:\583h7239-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 583h7239. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/9DBBAA9023E7FBEC 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/9DBBAA9023E7FBEC Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: z14zNYkfxYbM+CiPVci+rf60SGy4hlsKHtmoFozJ5FoqUQoTuvYbBQ1SWWJwRNgJ 0CAmCeVM3Fi18mH8lPseJG3wgQPDb9t0SoJLgVqa9Y1rJIsjkZnd4okz9EjCjo20 CELkw5khinwKNgAxTj5ZBygLQx0HbR9NekM4hjFXKj7lAtk3yCqDaiqhqdHFZLTx DJyJxjrRVMo+q/BN1z+KhFvH2JXEof0hKU94OgPhAu1lCR1q1fBJxTj0XsDPHDuU zUsoCs/TzInqxMHCvCUQJzAG7VtuK/ehoYop9xSeLUW/899RdRMklVjfrEcH40Ow Mjby4+xLfZum8ir11jfxq1coK6zCD2ZFuIw09aYMKRlZoMUlQ9LFOixbGxzmczs5 xJqKgYBbH2rtB4C2/J+gTkWjAUPX9BmfFviRMN8gl27zojr74b42KZqlMmh6p/+U hwCYj7Tw1jXXMdaIg2BMslQQPkhdGax5Z1xDEUNs2sjkOCtZENDOH//A7KMwD3jS xgiSpiGgHPzuRmpr+GcDR6Mj5A0SQO2P5XPkEhj3wiHQ9GIuWAUNjp04fG4XLqJ6 FKIP6Abh3Os7yvFGki73RVIk9T4ahYknSZLoNFEIpYi3ker+lk2JQcPouT2dYT/p I+4gDbpTAS1DO2K0yXeWPRVnz7f5ob1MIO9oCoUzGGFFDFbJ66znUbO97kSO2pEL Y+NR9CysVF1jVUHIkH2gRPTlrSSzaNTCNll3QnYt49YWG9z5QuTXCD4xx+9l9KL+ Aycs49UPNongLygFMq28MgXrue979SxvsOYWuQQKO1DZAL5v56B49DoY4h0z4y4K MnZFJstUypwmUAtHkwr7X+/vL3v/7v+ZgLR+/784faEwKtJzhMeqkdC0g9ZyU4ux sZ/sM6gHskqZcKulrCNNrAKwqIYTTkTz6KD6iCbKoZa5R08pJ90q/Bx8PI4Qr0Fb 0sKHPPGtetzyA/DwmhD+w8SWuvqxmguWpIQsnjl7kNG52rWxdYw3OuIsxTF/+WRm b1Haky8YGyD/HZitIaQTJPDozzqhUOFe0B5rEyjt973VuTJAXIOE/yw+VbWCucoV XrnDXCoyl6J3ItyaYNWlcZRzVc3zb0aJa2CAlTnKmsT4Uvdqns6wJn99UsFWxi70 t/jxZE6+P+LZbTyjJvw= ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/9DBBAA9023E7FBEC

http://decryptor.top/9DBBAA9023E7FBEC

Targets

    • Target

      PORT.bin

    • Size

      164KB

    • MD5

      6268478bf01dc3eacfa23372ca8b59fa

    • SHA1

      f497026449bef302c235a1749ede57e7a077e159

    • SHA256

      b5e73c65a92abd6d8ea6040739e6b71a207035f1517f3813c56fbac937b8ff06

    • SHA512

      94ed316419f5350a845f4a988cf7b74703486fab2ba7ad0652f7280370915d8685d44447a59e8fe1f133d3923a1e929a96fe659a1b69202aae619193048345e6

    Score
    10/10
    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Impact

Defacement

1
T1491

Tasks