General

  • Target

    dump1.bin.dll

  • Size

    164KB

  • Sample

    230306-yvfjsseb8s

  • MD5

    f0c97dcb65a030a214f6dd33cf4a8566

  • SHA1

    b23175fa1d3989baa2e3d8b5c7192554c24abf18

  • SHA256

    ed49b23df7defab3df933c778183b12c019ab253330090f214f4bb5c2f89bcbc

  • SHA512

    24d7963631784357c4615ef94cecda9caaf47bc33896d6c897da324d55bda70713da4957f82ead8764f82cf6af1b5d9c8d3ad015fe3354694e9c331abbb67485

  • SSDEEP

    3072:AZPM0OGdUKV10OTed7/kBazzFbULOHOiPyH53ZV6:AZPMnGZVyO6F/M4qyPU53Z

Score
10/10

Malware Config

Extracted

Family

sodinokibi

Botnet

17

Campaign

1062

Decoy

gaearoyals.com

georgemuncey.com

arthakapitalforvaltning.dk

placermonticello.com

pourlabretagne.bzh

daveystownhouse.com

gavelmasters.com

descargandoprogramas.com

trainiumacademy.com

mindsparkescape.com

artvark.nl

dnqa.co.uk

molade.nl

egpu.fr

mariamalmahdi.com

corporacionrr.com

blavait.fr

girlish.ae

mbuildinghomes.com

matthieupetel.fr

Attributes
  • net

    true

  • pid

    17

  • prc

    agntsvc

    msaccess

    winword

    ocssd

    dbsnmp

    oracle

    encsvc

    ocautoupds

    isqlplussvc

    sql

    wordpa

    excel

    ocomm

    outlook

    steam

    tbirdconfig

    mydesktopservice

    powerpnt

    dbeng50

    infopath

    visio

    thebat

    synctime

    sqbcoreservice

    onenote

    xfssvccon

    mspub

    firefox

    mydesktopqos

    thunderbird

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} Extension name: {EXT} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    1062

  • svc

    svc$

    memtas

    veeam

    sophos

    mepocs

    backup

    sql

    vss

Targets

    • Target

      dump1.bin.dll

    • Size

      164KB

    • MD5

      f0c97dcb65a030a214f6dd33cf4a8566

    • SHA1

      b23175fa1d3989baa2e3d8b5c7192554c24abf18

    • SHA256

      ed49b23df7defab3df933c778183b12c019ab253330090f214f4bb5c2f89bcbc

    • SHA512

      24d7963631784357c4615ef94cecda9caaf47bc33896d6c897da324d55bda70713da4957f82ead8764f82cf6af1b5d9c8d3ad015fe3354694e9c331abbb67485

    • SSDEEP

      3072:AZPM0OGdUKV10OTed7/kBazzFbULOHOiPyH53ZV6:AZPMnGZVyO6F/M4qyPU53Z

    Score
    7/10
    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks