Resubmissions

14-07-2023 13:12

230714-qfmqkaeh9y 10

24-06-2023 13:46

230624-q3bxksce3y 3

16-06-2023 09:20

230616-layteseb89 10

General

  • Target

    Revil.bin.zip

  • Size

    117KB

  • Sample

    230616-layteseb89

  • MD5

    62fac67e4a542b6cbd1941823d883bf6

  • SHA1

    7223e28ccbcbe201a0f2da3e227370f8f8ec315b

  • SHA256

    740ad8ea62f10de39e0b794cf6f579f25af1b8d79f859b48ecd41edc1f92cf13

  • SHA512

    36d4fbd234e918d7cd23b57a9111d495a0d951f396ce01457f1b0872174e6d7e253041d7ef8c143538ba105bd7092d27d911218b15d1404ab1f3c43b9f1042f9

  • SSDEEP

    3072:4Nv3BtRUwsIWn0evqneX8QfR5wVoPad+c43cG+r49WnFf5IO1:49BtRUwsz07nY5w+PZ4r7B5P1

Malware Config

Extracted

Family

sodinokibi

Botnet

$2b$13$wz1reRfdLg.aiStLDqg5JeqqySemSPatWKHdwbpWVrC3ty7Akscg6

Campaign

49

Attributes
  • net

    false

  • pid

    $2b$13$wz1reRfdLg.aiStLDqg5JeqqySemSPatWKHdwbpWVrC3ty7Akscg6

  • prc

    vsnapvss

    EnterpriseClient

    firefox

    infopath

    cvd

    tv_x64.exe

    VeeamTransportSvc

    steam

    encsvc

    mydesktopservice

    outlook

    synctime

    ocssd

    SAP

    cvfwd

    bengien

    vxmon

    bedbh

    ocomm

    ocautoupds

    raw_agent_svc

    oracle

    disk+work

    powerpnt

    saposcol

    sqbcoreservice

    sapstartsrv

    beserver

    saphostexec

    dbeng50

    isqlplussvc

    CVODS

    DellSystemDetect

    CVMountd

    TeamViewer.exe

    dbsnmp

    thunderbird

    mspub

    wordpad

    visio

    benetns

    QBCFMonitorService

    TeamViewer_Service.exe

    tv_w32.exe

    QBIDPService

    winword

    thebat

    VeeamDeploymentSvc

    avagent

    QBDBMgrN

    mydesktopqos

    xfssvccon

    sql

    tbirdconfig

    CagService

    pvlsvr

    avscc

    VeeamNFSSvc

    onenote

    excel

    msaccess

    agntsvc

  • ransom_oneliner

    All of your files are encrypted! Find EDGEWATER-README.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] What's Happened? [+] Your files have been encrypted and currently unavailable. You can check it. All files in your system have {EXT} extension. By the way, everything is possible to recover (restore) but you should follow our instructions. Otherwise you can NEVER return your data. [+] What are our guarantees? [+] It's just a business and we care only about getting benefits. If we don't meet our obligations, nobody will deal with us. It doesn't hold our interest. So you can check the ability to restore your files. For this purpose you should visit our website where you can decrypt one file for free. That is our guarantee. It doesn't metter for us whether you cooperate with us or not. But if you don't, you'll lose your time and data cause only we have the private key to decrypt your files. In practice - time is much more valuable than money. [+] How to get access to our website? [+] Use TOR browser: 1. Download and install TOR browser from this site: https://torproject.org/ 2. Visit our website: http://4to43yp4mng2gdc3jgnep5bt7lkhqvjqiritbv4x2ebj3qun7wz4y2id.onion When you visit our website, put the following data into the input form: Key: {KEY} !!! DANGER !!! DON'T try to change files by yourself, DON'T use any third party software or antivirus solutions to restore your data - it may entail the private key damage and as a result all your data loss! !!! !!! !!! ONE MORE TIME: It's in your best interests to get your files back. From our side we (the best specialists in this sphere) ready to make everything for restoring but please do not interfere. !!! !!! !!

  • sub

    49

  • svc

    QBCFMonitorService

    thebat

    dbeng50

    winword

    dbsnmp

    VeeamTransportSvc

    disk+work

    TeamViewer_Service.exe

    firefox

    QBIDPService

    steam

    onenote

    CVMountd

    cvd

    VeeamDeploymentSvc

    VeeamNFSSvc

    bedbh

    mydesktopqos

    avscc

    infopath

    cvfwd

    excel

    beserver

    powerpnt

    mspub

    synctime

    QBDBMgrN

    tv_w32.exe

    EnterpriseClient

    msaccess

    ocssd

    mydesktopservice

    sqbcoreservice

    CVODS

    DellSystemDetect

    oracle

    ocautoupds

    wordpad

    visio

    SAP

    bengien

    TeamViewer.exe

    agntsvc

    CagService

    avagent

    ocomm

    outlook

    saposcol

    xfssvccon

    isqlplussvc

    pvlsvr

    sql

    tbirdconfig

    vxmon

    benetns

    tv_x64.exe

    encsvc

    sapstartsrv

    vsnapvss

    raw_agent_svc

    thunderbird

    saphostexec

Extracted

Path

C:\Recovery\EDGEWATER-README.txt

Ransom Note
---=== Welcome. Again. ===--- [+] What's Happened? [+] Your files have been encrypted and currently unavailable. You can check it. All files in your system have dayk0oe74 extension. By the way, everything is possible to recover (restore) but you should follow our instructions. Otherwise you can NEVER return your data. [+] What are our guarantees? [+] It's just a business and we care only about getting benefits. If we don't meet our obligations, nobody will deal with us. It doesn't hold our interest. So you can check the ability to restore your files. For this purpose you should visit our website where you can decrypt one file for free. That is our guarantee. It doesn't metter for us whether you cooperate with us or not. But if you don't, you'll lose your time and data cause only we have the private key to decrypt your files. In practice - time is much more valuable than money. [+] How to get access to our website? [+] Use TOR browser: 1. Download and install TOR browser from this site: https://torproject.org/ 2. Visit our website: http://4to43yp4mng2gdc3jgnep5bt7lkhqvjqiritbv4x2ebj3qun7wz4y2id.onion When you visit our website, put the following data into the input form: Key: vDQqoK/K2NQibjxTuGFVkTPd03m9Z+naO0zc/xupBgS2JB9NXi+mqqkOAtVgcW3x JOuLlUcewFHRZ9G5G4KHLbznsymw75BNIdyQFD1+igufyDMiOBqGbwwF1VsTwuPY RyoC8ThUhsboJSLkqHJ+mb27forHIsCGypV9bps9qpZck7XKQEh3wakCYxJi4acI srPtwT7yCAL4fa3YCNkRd2ZL3EhKjWBopoPdojBnAkV/FVIvsjA81Y+zQfCQHX+h wMLsptKOATHgd7d03MrCv5WVskay61uwu5oOMvYpEBnxB1azIwry+NGEf+k/ncIJ kVHE8+0dVbh5izTOam2KotslqU2eetrqpC3LMUqbjJVX9QgpFQEY/lwSthDNISGb tBELpUAhs9v+0dMbY3Smh/pdszDLu1UBLtWXQ071HsRTQlXMJLUliGimZIossqXL 3wRaQNiKHPD2Z/iPbqE1RrvkxJDD86yj/XqrSDvsUpnCTG6jN2LBvziv8FY3rUow yRLiiSq+Ojng6LIMn04qMdZt+deofhRE5nuXeVgW6OTwjQ6v3F5nrZGroQ7/Uzfs WXYsxPi2Qc1og+5MkwI0Vsm2PAiF3gXm4y5lkW8L/8p7LtVBJs/4Pbc6c2a6eG4R 2lyp6dMPevgieSW/MyPB2bUGzXF6fieqx2k+a0TiBvngFMve2ICoSO/iyQAUJ6v4 Cu1dQB1VixkjiyV0cnT7N85f7v2QS/wktM5dSuoUnIrmTOLDoV6JNKetmyEH+nH/ 4pH0UVo16LhoLG+GMY2fOfNEeXVJv7F02huYwmdYaWMX2ZgZF9au2TmMNMBVxfbw f/yGSsl7u+FKUWPfSQlWKsA5HWRwiV/DgudZwDlPswqAh4CAOk5vchLgbz7CV2fA dgpU4mT1dcG+vPvk2LJvFh0zd5eukQszurfyhuA53VBd8inJKsHSnaxO4x7MKOCL 7diK2cB84bm65FCKksSOYd1aJGYstL464eXA5i+Tp9skFiKRbp+LjuqO/QldY/PT 6VNP4LCKmK05i8AfHclZfA+XxLfdG/y/4420Cj6F1K8PuohRrpJ60wMbqu4w0L6g 4jStyVSQ6jb549Z9JrD/Rpv0Jx9D7OY6ujVYyZyfFOqE46V14cxip6j5gtWmRfN5 wE7NxzjqD55CQWqkkcqclrcv8bNVvjTaMHRdytcSoWH7pxLvrga9EoVvR4hb0OB9 d0oGAc0rLW0I9CdVYNtdCzRjz9VrjO9AGSlq6mBPW1sppIE7ymfpQmZJmfUkL9w1 5cpFACwxy7g7jFo1W5+wwKV6MHc7PG3WKywdP5CMjaE= !!! DANGER !!! DON'T try to change files by yourself, DON'T use any third party software or antivirus solutions to restore your data - it may entail the private key damage and as a result all your data loss! !!! !!! !!! ONE MORE TIME: It's in your best interests to get your files back. From our side we (the best specialists in this sphere) ready to make everything for restoring but please do not interfere. !!! !!! !!
URLs

http://4to43yp4mng2gdc3jgnep5bt7lkhqvjqiritbv4x2ebj3qun7wz4y2id.onion

Targets

    • Target

      Revil.bin

    • Size

      119KB

    • MD5

      fa8117afd2dbd20513522f2f8e991262

    • SHA1

      f7b876edb8fc0c83fd8b665d3c5a1050d4396302

    • SHA256

      78b592a2710d81fa91235b445f674ee804db39c8cc34f7e894b4e7b7f6eacaff

    • SHA512

      2bab344d136b31cd7c55b7cd0ef1b7718c9952573f3b1478a2efb8211563d7dedacefd4764a7186e15f7de93cc43fa29fc4d2fa61961a14bb12d7bea830e5032

    • SSDEEP

      3072:KW5yc3Y4SMQwuOekD96R928AN+/uSxo+HHz/bs/k4OS:K83Y5BAxa92KrxTnz/Y/k4O

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Impact

Defacement

1
T1491

Tasks