General

  • Target

    VirusShare_21d01fa87dfcaf971ff7b63a1a6fda94

  • Size

    137KB

  • Sample

    230508-wdvlaabh88

  • MD5

    21d01fa87dfcaf971ff7b63a1a6fda94

  • SHA1

    f3caa9831fc715af4f47cd98803549902dffe30a

  • SHA256

    ab0aa003d7238940cbdf7393677f968c4a252516de7f0699cd4654abd2e7ae83

  • SHA512

    f89997f8c31d77029f1087257a5b24337f9989bebfbe4169067acae72a5dd50ce118d273fae00690ef2e2bf345901d723034992f53dd3e5b9df5cbe9be2e67fa

  • SSDEEP

    1536:ASOoRSNl/XT9yYSvVKJJgpBy7bICS4AUsiz8djOK:WPaKJJctOqjOK

Malware Config

Extracted

Family

sodinokibi

Botnet

$2a$12$QKlALWFyUOkhUAlOVB5LeuiilRPMgdL4kq9Ex9LPdBEioQWEgg09C

Campaign

8506

Attributes
  • net

    false

  • pid

    $2a$12$QKlALWFyUOkhUAlOVB5LeuiilRPMgdL4kq9Ex9LPdBEioQWEgg09C

  • prc

    ocssd

    mydesktopqos

    msaccess

    thunderbird

    mspub

    firefox

    sqbcoreservice

    visio

    winword

    excel

    synctime

    thebat

    onenote

    tbirdconfig

    oracle

    infopath

    powerpnt

    isqlplussvc

    dbsnmp

    ocomm

    mydesktopservice

    dbeng50

    agntsvc

    encsvc

    xfssvccon

    steam

    ocautoupds

    wordpad

    sql

    outlook

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [-] Whats Happen? [-] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [-] What guarantees? [-] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] Using a TOR browser! 1) Download and install TOR browser from this site: https://torproject.org/ 2) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DON'T try to change files by yourself, DON'T use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    8506

  • svc

    memtas

    sophos

    svc$

    vss

    backup

    mepocs

    veeam

    sql

Extracted

Path

C:\Recovery\8e2y81-readme.txt

Ransom Note
---=== Welcome. Again. ===--- [-] Whats Happen? [-] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 8e2y81. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [-] What guarantees? [-] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] Using a TOR browser! 1) Download and install TOR browser from this site: https://torproject.org/ 2) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/C8122D50B6F33773 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: kmFf01Rk1G7chE2N2u+kxsEbMx48QQ8Wf57bSgDF/06SbWi4PAaP8hgcBnW0AoAy loJGVX2qhbfBjJa6g/3Wt63vqZwTRSTIcRge+Pmtu6/S79Vzmwsh4sa+ShXP5Vse 1SoFHiaOj761lFTUOUge94JBRFB5a+dMiw0cOc5GSOTnSGm3+m3vHYYWI4sjnRf6 dyvz09OXjnTGjGPMcUYj9y+2ofNtpBI9+ujN8jyJe3jmWSJyrlHRYgQi2Mk8t7FW 2iEFqaXsqzx4FCkF+pDRzXDW4gT5BDPGM7lPoTBkzW3eiM+LOZGS1V+SZO7xF2ps BGXnIRU129jKOH0jLIFKH3wdvt0YTho5vZ17vGG68XZ0RZcAdnuACZVwDpnqCVId dWPHqe5fK+pP8pR2dhXSPXebV43UoHwjCUbfN4W+zqt3QXWEzVcklw2cbrk0XhDw xUiUsBhWN6kKupAnUPzTuCU1s9BNADTD8juY3v+F5Z4SJjfK7U1ERknSZHcGRnru RO/sjpVblW2TR4gHW/09VOxPYoY7nCTXkqBbLxcXa5ebl7GZ1k97Q9VWlYSdu3LK +ibkhfHPRnmdeA1IESzulSI55Yh5xnRQp56GNLTIn1m4B0a6h/LgBCx7xbVElo54 Qd7URFWcnR7DSme4k1/WCr1TK2GRiWM6tTEgVizQS+oym7WYTyAoC91sMbDDGzc7 58CXWJp4wpipEq9cWIkzajusc3QcfWW4Ppb57YDuMbkIMlmExbdD5qmpo+rrxYGV epLaeXt1iuk0Cxpya4+kt0jCq8So6kQwrSELCPE7bcGiVnZeayd303y26rPkjGZC E4z1lG7NjhlpAmLme+1RSwgrq35PcX91k+P/QUMDeVjHMtrsqai/3vGXm0bnR3/A FUgsUFRP2795EXdh3y3Ct7C+iVzwrTqKf5eQivUQAQDhLsl0HkUcsyS3ShG2Pqr6 hyHUjlQRJf6MgWugS83BnhL+SAO+9koTUQSl5krcrAw3CT9VRaB4Nb95z0mWJD+F PlcaST5MLvsLvkQ9/f56SiqHwGPJEr6PNbE8iWa4WAaMbz+2wPZn55vt+9UMqFQp kiMgJaI9HlmYVjthHv4Drfdiv+eHfxpL3eroGloWGNsVKX7IKxpv8aZG52Jgia6O I3CvmLKQA1IYIWTmyYGG3GmwBwu/8Axk5N2CZLiT3zj/LHLYAnOra2es2O/xDK27 f19mZdx6gKv48upg2t6SnLdSwPKS6j2XmQvxUkRISmpL5SPkkflFIz4GyU0GmSFs sQbt2FBISvIXDYGDMUevviGwvOs= ----------------------------------------------------------------------------------------- !!! DANGER !!! DON'T try to change files by yourself, DON'T use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/C8122D50B6F33773

Targets

    • Target

      VirusShare_21d01fa87dfcaf971ff7b63a1a6fda94

    • Size

      137KB

    • MD5

      21d01fa87dfcaf971ff7b63a1a6fda94

    • SHA1

      f3caa9831fc715af4f47cd98803549902dffe30a

    • SHA256

      ab0aa003d7238940cbdf7393677f968c4a252516de7f0699cd4654abd2e7ae83

    • SHA512

      f89997f8c31d77029f1087257a5b24337f9989bebfbe4169067acae72a5dd50ce118d273fae00690ef2e2bf345901d723034992f53dd3e5b9df5cbe9be2e67fa

    • SSDEEP

      1536:ASOoRSNl/XT9yYSvVKJJgpBy7bICS4AUsiz8djOK:WPaKJJctOqjOK

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Impact

Defacement

1
T1491

Tasks