General

  • Target

    sample (1).zip

  • Size

    117KB

  • Sample

    230704-y83aqahe65

  • MD5

    b508a277f3a03dc1d75cd2211b604589

  • SHA1

    26bed9699112d4d9edce04cd0e3f09638733475d

  • SHA256

    1836f1a909119113853c1253e2808057b8699d6831c27c86b9933a86acf7775c

  • SHA512

    699d32bcba2c75596c3291be6f7507c227950db321b59246273e4bbd35fec0d32908b636df5c1ad7467fdb42345b2b76edae2c8687e6176da2501a94da92f6f8

  • SSDEEP

    3072:ILUBn1i65sL6AuDXgI8cpvcK4Kd30kSPTbIiAgleOggEOqUi6al:GswcsL0EK4g0kSQiBleRgEhHl

Malware Config

Extracted

Family

sodinokibi

Botnet

$2b$13$wz1reRfdLg.aiStLDqg5JeqqySemSPatWKHdwbpWVrC3ty7Akscg6

Campaign

49

Attributes
  • net

    false

  • pid

    $2b$13$wz1reRfdLg.aiStLDqg5JeqqySemSPatWKHdwbpWVrC3ty7Akscg6

  • prc

    vsnapvss

    EnterpriseClient

    firefox

    infopath

    cvd

    tv_x64.exe

    VeeamTransportSvc

    steam

    encsvc

    mydesktopservice

    outlook

    synctime

    ocssd

    SAP

    cvfwd

    bengien

    vxmon

    bedbh

    ocomm

    ocautoupds

    raw_agent_svc

    oracle

    disk+work

    powerpnt

    saposcol

    sqbcoreservice

    sapstartsrv

    beserver

    saphostexec

    dbeng50

  • ransom_oneliner

    All of your files are encrypted! Find EDGEWATER-README.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] What's Happened? [+] Your files have been encrypted and currently unavailable. You can check it. All files in your system have {EXT} extension. By the way, everything is possible to recover (restore) but you should follow our instructions. Otherwise you can NEVER return your data. [+] What are our guarantees? [+] It's just a business and we care only about getting benefits. If we don't meet our obligations, nobody will deal with us. It doesn't hold our interest. So you can check the ability to restore your files. For this purpose you should visit our website where you can decrypt one file for free. That is our guarantee. It doesn't metter for us whether you cooperate with us or not. But if you don't, you'll lose your time and data cause only we have the private key to decrypt your files. In practice - time is much more valuable than money. [+] How to get access to our website? [+] Use TOR browser: 1. Download and install TOR browser from this site: https://torproject.org/ 2. Visit our website: http://4to43yp4mng2gdc3jgnep5bt7lkhqvjqiritbv4x2ebj3qun7wz4y2id.onion When you visit our website, put the following data into the input form: Key: {KEY} !!! DANGER !!! DON'T try to change files by yourself, DON'T use any third party software or antivirus solutions to restore your data - it may entail the private key damage and as a result all your data loss! !!! !!! !!! ONE MORE TIME: It's in your best interests to get your files back. From our side we (the best specialists in this sphere) ready to make everything for restoring but please do not interfere. !!! !!! !!

  • sub

    49

  • svc

    QBCFMonitorService

    thebat

    dbeng50

    winword

    dbsnmp

    VeeamTransportSvc

    disk+work

    TeamViewer_Service.exe

    firefox

    QBIDPService

    steam

    onenote

    CVMountd

    cvd

    VeeamDeploymentSvc

    VeeamNFSSvc

    bedbh

    mydesktopqos

    avscc

    infopath

    cvfwd

    excel

    beserver

    powerpnt

    mspub

    synctime

    QBDBMgrN

    tv_w32.exe

    EnterpriseClient

    msaccess

Extracted

Path

C:\Recovery\EDGEWATER-README.txt

Ransom Note
---=== Welcome. Again. ===--- [+] What's Happened? [+] Your files have been encrypted and currently unavailable. You can check it. All files in your system have zdu5084 extension. By the way, everything is possible to recover (restore) but you should follow our instructions. Otherwise you can NEVER return your data. [+] What are our guarantees? [+] It's just a business and we care only about getting benefits. If we don't meet our obligations, nobody will deal with us. It doesn't hold our interest. So you can check the ability to restore your files. For this purpose you should visit our website where you can decrypt one file for free. That is our guarantee. It doesn't metter for us whether you cooperate with us or not. But if you don't, you'll lose your time and data cause only we have the private key to decrypt your files. In practice - time is much more valuable than money. [+] How to get access to our website? [+] Use TOR browser: 1. Download and install TOR browser from this site: https://torproject.org/ 2. Visit our website: http://4to43yp4mng2gdc3jgnep5bt7lkhqvjqiritbv4x2ebj3qun7wz4y2id.onion When you visit our website, put the following data into the input form: Key: 3Meacr/oSV6UTVqkTERnx7qg5aC2ZHrg//HuYgAWgeQan2grzws8PI4MQqqCVDqz 2MZvTo1trsWpobl98JTSy9P989X1+yVGlCmPloJT3BoxvGXJgWanKg/MdU7n1OgW HAYs44IGc2aVAmLpYdvy5aVOJcQRpHrOwxG2bJLJOlNWh86/FVnrs9lnVf28cqdP 53KzUiVr8/PaDexcVCnqY14Tx/wcbEO6WQZhs9SSuTElp7Ds/NcsRAdidQinfljF kCowmJJoXa4CzPHcvPwiWrAZpnJaiaic/nckmVyrEtKzwcHFWQvKlEsViGqfIXkH q8lT8SC/DNxt54YsVVabiSX91MrppANMjgdRBH4fx9lneKU+pexth0ATUBcoIHUS pb0vMrty0ldxw4lFwJfrjvtKLEQ+gVg2nW32ZQa+7kVFWnz1ELJIR2BhG7RuJKaS fhl1i4kdqHAtGrU9ko+aKKn5y/Om6hVDM4s56wGp+KKoyQezZE0c2N9QJpwZpa2F 1D3apFsZ9EEx7dwgP0rCwUpAqsOR9vHhEEC4wSnTrMqZkB414LpRdgLLCEcwk5xB RilA+SJrJ785d2TJ15pO0XFwJ7oXRCwdeL+uU6dfwYrVb7Rp6JO7T1jegEhd32LI GQs+21fNFSzscpyRV/re3u7BrXmHm5sHtFfNLt0Bb/g3ZxlsDFaBsRyXiiJ4shaF ZM7i1RW1tHAxdlXYiFdVvEndkoJh+XGsNPFJkGIui+QiDx8mga3TYapWYMQAVLHb YuEU3fj/EFkJPsWkU473yHVlDO2Zb2SgOoT/aYaI82+g3crvCD8UaNlmLIf7P4j3 2NrLHmNbgrmskYoGr0k+BYa4B0VKsASCDcBHhpWV0bBP/JbNXzLjL/rQY0qbtXyl PWZE1jaxicv9qRGD3IC0Y7wSboz3YUDgX0iNr/Jw6eXK/TNOF0tnBYTJuKcbtuEL 5mvUenaN4hdWPyOIEo6eOCQmKx38UEDmY7Ml0ibis3oAsPiQP10KaCtgcUdUFk7G ir4KgbBgzMxbMF4X651Fif16Jz7YQJoVep+O6IUnufZ3UQZF+kVbEBrvxniS1PTM TmQZlqsegAMPEeEiYKHCJtHelYcofb/KRqqlDy4CF0W8SoRKF/2+FLHmG3heOHn4 7DocVh0mD+n9CkzfKEm76hZwFOOLacGp7gWzMk5OirMYnQ1qvEisUEXlL34i0KvB 98pqQkegZnek+Fri6tY2bJFBG1I7LKAtm7WFh6hAynmpkUdJ7L3RnHrxp82qUg8w h9kSf1sufBQ5s9fdYbrnC15r1d22BAr1/uo6TWOmoUHcORGWI4wuFcuLpCNa4Zfb vvXxE5GxwAhVrdZjidVHbYadPM+ko4UQVL54JvXC4aQkTo0w !!! DANGER !!! DON'T try to change files by yourself, DON'T use any third party software or antivirus solutions to restore your data - it may entail the private key damage and as a result all your data loss! !!! !!! !!! ONE MORE TIME: It's in your best interests to get your files back. From our side we (the best specialists in this sphere) ready to make everything for restoring but please do not interfere. !!! !!! !!
URLs

http://4to43yp4mng2gdc3jgnep5bt7lkhqvjqiritbv4x2ebj3qun7wz4y2id.onion

Targets

    • Target

      Revil.bin

    • Size

      119KB

    • MD5

      fa8117afd2dbd20513522f2f8e991262

    • SHA1

      f7b876edb8fc0c83fd8b665d3c5a1050d4396302

    • SHA256

      78b592a2710d81fa91235b445f674ee804db39c8cc34f7e894b4e7b7f6eacaff

    • SHA512

      2bab344d136b31cd7c55b7cd0ef1b7718c9952573f3b1478a2efb8211563d7dedacefd4764a7186e15f7de93cc43fa29fc4d2fa61961a14bb12d7bea830e5032

    • SSDEEP

      3072:KW5yc3Y4SMQwuOekD96R928AN+/uSxo+HHz/bs/k4OS:K83Y5BAxa92KrxTnz/Y/k4O

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks