General

  • Target

    12d8bfa1aeb557c146b98f069f3456cc8392863a2f4ad938722cd7ca1a773b39

  • Size

    120KB

  • Sample

    230221-npsl3age3w

  • MD5

    2075566e7855679d66705741dabe82b4

  • SHA1

    136443e2746558b403ae6fc9d9b40bfa92b23420

  • SHA256

    12d8bfa1aeb557c146b98f069f3456cc8392863a2f4ad938722cd7ca1a773b39

  • SHA512

    312dcb3d83a5201ef16c5027aabd8d7baebfd9761bf9514cafecc8a6936970b897b18b993e056d0f7aec81e6f0ab5756aa5efd3165e43f64692d5dbdb7423129

  • SSDEEP

    1536:bjxXC9jVwbhEW8z3w1R+KjJLRiOQJo0SoLCdpuOk2ICS4Ang6lUgvfYiFyRFywX/:mmV1wKdLoLC/OemUWYjfywpbPa

Malware Config

Extracted

Family

sodinokibi

Botnet

$2a$10$dfjpLrXuDytfF.kmYtQ1ROgsXjTJEe8EmQT65ftxlTpJtXPZrhsAq

Campaign

7178

Decoy

kamahouse.net

bridgeloanslenders.com

abitur-undwieweiter.de

live-your-life.jp

xn--rumung-bua.online

anteniti.com

marcuswhitten.site

ostheimer.at

joseconstela.com

deepsouthclothingcompany.com

dr-seleznev.com

ecpmedia.vn

aunexis.ch

anthonystreetrimming.com

pocket-opera.de

mooreslawngarden.com

osterberg.fi

extraordinaryoutdoors.com

kamienny-dywan24.pl

fitovitaforum.com

Attributes
  • net

    false

  • pid

    $2a$10$dfjpLrXuDytfF.kmYtQ1ROgsXjTJEe8EmQT65ftxlTpJtXPZrhsAq

  • prc

    avgadmsv

    BackupUpdater

    ocautoupds

    synctime

    thebat

    excel

    isqlplussvc

    ccSetMgr

    SPBBCSvc

    Sage.NA.AT_AU.SysTray

    lmibackupvssservice

    CarboniteUI

    powerpnt

    BackupMaint

    onenote

    klnagent

    sql

    Rtvscan

    xfssvccon

    Smc

    mspub

    encsvc

    LogmeInBackupService

    kavfsscs

    ccSvcHst

    BackupExtender

    NSCTOP

    outlook

    dbsnmp

    mydesktopservice

    tbirdconfig

    ShadowProtectSvc

    msaccess

    wordpad

    mydesktopqos

    BackupAgent

    visio

    kavfswp

    ocssd

    thunderbird

    infopath

    agntsvc

    sqbcoreservice

    steam

    AmitiAvSrv

    dlomaintsvcu

    Microsoft.exchange.store.worker.exe

    winword

    dbeng50

    firefox

    TSSchBkpService

    DLOAdminSvcu

    kavfs

    ocomm

    oracle

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] Attention!!! [+] Also your private data was downloaded. We will publish it in case you will not get in touch with us asap. [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    7178

  • svc

    ssistelemetry

    adsync

    svc$

    msseces

    mbamservice

    ssastelemetry

    altaro

    sbamsvc

    ds_notifier

    ntrtscan

    ofcservice

    code42service

    macmnsvc

    memtas

    auservice

    telemetryserver

    tmccsf

    psqlwge

    sppsvc

    viprepplsvc

    azurea

    ds_monitor

    swi_filter

    protectedstorage

    mfemms

    mfevtp

    kaseyaagentendpoint

    ltservice

    dssvc

    altiback

    masvc

    huntressagent

    mcafee

    kaendchips

    kavfs

    reportserver

    savservice

    altiftpuploader

    sophos

    svcgenerichost

    altiphoneserv

    klnagent

    mepocs

    ds_agent

    threadlocker

    sql

    vss

    tmlisten

    backup

    tmbmserver

    savadminservice

    vipreaapsvc

    mfewc

    altictproxy

    ltsvcmon

    altivrm

    huntressupdater

    kaseyaagent

    teamviewer

    msdtsserver

    amsp

    storagecraft

    veeam

    bedbg

Extracted

Path

C:\Recovery\7eyi5ykf-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 7eyi5ykf. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] Attention!!! [+] Also your private data was downloaded. We will publish it in case you will not get in touch with us asap. [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F9E73F0C6C96925F 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/F9E73F0C6C96925F Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: Jsam951KorNKbMaOUDjszOXsPuYz2MIgOUUjuVG5ablsUORvzAGt2/8vxxvVXka2 vihBMUeqy8RTwXNz+o+XAGr5NuNp9581dkkRLjSnMODVuxw+G9BrR7Jo0LjHAGUO f+Lk6rT1RRhuX+5XU4Pk04ncF6nFaHrtcnGRUreP62XeuU8yQxt7j/nkVmZXYOWQ /ltJM0KcfIbVosJPraLc0nrpV4ZMhUD/MknqMyeWKVWE4GCGukqDQk9nzkMvWBtX V9RrlbNf4jUzbcCoKFfaIxVcqm+at6Fr14SMCgPYLTYm4Xe/5HUuLTwcP4XucthK 8VC72cZr+rxkAJ9OeCPkhyCvCh6OgUvgSN9iY1/PKTdgZYeGgbtwS66eeFgDKzHD CcV+Bb4BDKAQEYuhLXMBlNmOK7/1QY7xrAwa1rI5cq1WhJeP3rlgJwR4DmU5LFeF L29PYxOIa2mDxhDOcLk1ZdHBuqQDW6IDQpghtpifolpGeO3LOhSATjl/HP5lFIUU Fw5iO8DbUEpxlXG5eUZft5iOs+Aku5+rRuMA8tzamN7EIIJp6FYqUV5rDR7JOLEn Mr4mxT1n9cfvBTn3zRnwHFPj+R/NSbWj1iMZP/fcHWIFUQs5SOoF+DcxZJECxBC+ 0ot5qCXPMKkHupDi/3PUxA2rEOflo5dCXWNPMcccnTukis/aItvs/gnp+9E6YSqb z+Ks9Dlvizjr3le3fl5dUMrsgW+qZ+3CMTOdLFItS+CHxsy4JjA8HTxXCyVxRLvM IB3mJPM8I3SjWCRbhKwdyxuHdHa3eLLaIFWwtga0cBHi6sNXaBmuuZJFBh7wgz8E NviXMcKMMFdr8T+IZbuyvgbxhKWCCULz4F3dJub+6MxUz9pMVt02zSUojsqK6YUb Zxghs0xr7fwZmpC0gLBnpiByAJlsw5zlILFCsaxGOLzMdaFa9eh9Wx9m9kTIEV/M NZWu0uq2EaHIfo7I06MNNaLwMzpE3s7VHxmhiXlgRGegFztpuN7EJZlRLj456pS9 i5iIbe815uVl42HQ1qg0lVfjcRrQPwSUhiEJc+pxHiIm6gXrnftFBzZ8xBfb0RYW bFTswazYgJsA2+VnoDJMZkHpHlJzoRSi7RBmdsMN9CiaBvO817XGtItV9Ddv2pXW xGI+jdAySVYmcdcGtagtQ8ZGFuzJkzmmCcmwVsaUhKZ+PKTPvf0pkJMRo9KJAVz5 wTaMfEwpgzOyQtdvXP7rY/AlYyq9xbtV1SYo/Zs0NtpENM7XpdROrJRt9JNYnuqM NxhBEMmsfVrtu5QzmZB+I4lU4NTmGIe+ ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F9E73F0C6C96925F

http://decoder.re/F9E73F0C6C96925F

Targets

    • Target

      12d8bfa1aeb557c146b98f069f3456cc8392863a2f4ad938722cd7ca1a773b39

    • Size

      120KB

    • MD5

      2075566e7855679d66705741dabe82b4

    • SHA1

      136443e2746558b403ae6fc9d9b40bfa92b23420

    • SHA256

      12d8bfa1aeb557c146b98f069f3456cc8392863a2f4ad938722cd7ca1a773b39

    • SHA512

      312dcb3d83a5201ef16c5027aabd8d7baebfd9761bf9514cafecc8a6936970b897b18b993e056d0f7aec81e6f0ab5756aa5efd3165e43f64692d5dbdb7423129

    • SSDEEP

      1536:bjxXC9jVwbhEW8z3w1R+KjJLRiOQJo0SoLCdpuOk2ICS4Ang6lUgvfYiFyRFywX/:mmV1wKdLoLC/OemUWYjfywpbPa

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Impact

Defacement

1
T1491

Tasks