General

  • Target

    svchost.bin.zip

  • Size

    121KB

  • Sample

    230916-pv8qxadd38

  • MD5

    29c4b46f59c38e81caa4e89fb075dff5

  • SHA1

    5b1c24a1ba27a2cec31b0696db2db3591325acfb

  • SHA256

    3f2198870df4c4d85119f93bbc803d4abc24925e336462168384f285b5855187

  • SHA512

    5b4bf75691fb5022b14683343d33f923d18ec5d546d3743df526c18189c76fcd5195dc8010d5aa7d14affbdb22ee11a41387bb50b41b369b220b24a0e92fe6c2

  • SSDEEP

    3072:k+0Te+E9seHB6yWm0XOW+l1gLkFqQnKTi9yrAG+3k00xyVf:UelHB69rGSJwAigWhpV

Malware Config

Extracted

Family

sodinokibi

Botnet

$2a$10$QgeMRYnA0vYY4iIP7dvCVeoO8XNiMVn5P6JF9FCirGcxXz4UfY2wi

Campaign

3908

Decoy

nicoleaeschbachorg.wordpress.com

evergreen-fishing.com

punchbaby.com

platformier.com

stemplusacademy.com

stoeferlehalle.de

lightair.com

evologic-technologies.com

femxarxa.cat

winrace.no

xtptrack.com

norovirus-ratgeber.de

centrospgolega.com

kindersitze-vergleich.de

sweering.fr

rafaut.com

rerekatu.com

finde-deine-marke.de

vetapharma.fr

siliconbeach-realestate.com

Attributes
  • net

    true

  • pid

    $2a$10$QgeMRYnA0vYY4iIP7dvCVeoO8XNiMVn5P6JF9FCirGcxXz4UfY2wi

  • prc

    onenote

    dbsnmp

    sqbcoreservice

    oracle

    excel

    msaccess

    dbeng50

    infopath

    winword

    wordpad

    sql

    mydesktopservice

    thunderbird

    mspub

    xfssvccon

    outlook

    visio

    isqlplussvc

    firefox

    ocomm

    agntsvc

    steam

    ocautoupds

    powerpnt

    synctime

    tbirdconfig

    encsvc

    mydesktopqos

    ocssd

    thebat

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} Extension name: {EXT} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    3908

  • svc

    veeam

    sql

    svc$

    mepocs

    memtas

    vss

    backup

    sophos

Extracted

Path

C:\Users\11379n7c-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 11379n7c. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/0318A68183AD3849 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/0318A68183AD3849 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: KJZYvUd9xS3vbKITZ7D+o5va5GGpetT2jkDtRToWOlGNDd78AbMszvGMY4qKfYGO /Po3e54Chh8xk9CXPK7XZgsMybmhJqhU4Inktgb4oMe4Lh4hyTNRANeBWhX6QPrw lwxtqRQpli/kGGmPzyOMkh+UJxRgoMTNJWYjP96jSUnLBSM5W+18ADnZI3vkf1Sw PuJbf86Hz5vuLFy4jGrQ/5MVPziMTjIbvgeVPXx2HtlKKXqa58DueaS3H9p4iLWs doej/SjVv3h5qt4dIYAq0YY1YYD3Qi/vukFD9zAUfTop4hGqm8Vkl12ETQQZCUE4 tC3+Cx9/kyVFqJR6BZwX9mxxyJjTbJX5yW5DnQWZgdBBgKADVnvQ3IMSnw/+k2tX z1ybCObKVTqPJ4uqUkYrNVDx3IlmU0MzLq/u7pCkikeEf5mGFcnsEU83BHg6G0Xw hCx35xaqfS73mfRBH3Yg4oMAUBIcOzVAYvKBEMtO9UbKrAwqMqLB0ovldS4lmlsQ 8zIZxXFqtS1tyUZMJpSDvY3pZDd/Q8FsLuilIvwHqZWVijk85EemhOolL8f7j5pT 8pCxjRt4eZB9IDi2FqDtCurwn2JQTsCLOJXnSd5zhM+BhQZ3p+uT+kPw89hJ06Pz 0r75H/bLkguieFbWXc83Yf3AM2guw3yfPivSifx+/YPlH0TQhMQY/xslouuOIs2E uo5rGrfacEHIGYuYJfkI5GZhmxArdtyxqAOYqnSs9IxJp7aRbmdMKN/+9D8Dd+Gz BDiUkNo1RB6+2joOgTNlt3YgT14U794DxvMihilTEBPJSpPR+mymvTELAmJOsI1R +Z/7NQh61f3XIXM7v2Loh0FHnXrH7TEIN88jLmWP6+ImqVJT/8VGbIlzvk9gkemj PumQtGI8R8gsVp72EYxrdV0dWQS7uWQIkH9nLbyOT5X68HoGFvHGTzewsG/Pp1AY livCITruLIJYa+KdtX8XMZdcdfs/xoGDGHic8QZU0mpbMcqg9yvwp3fZs5NMYHCn RuAsOqM4mZ7bvdA1FAFRTyNB06hyx6+tIiLA+93bbiv3PS9Br/P7DIxxBcpVkPLC MKKxqp5f/hu98EcAI+sU0ByoyyvJ4rAfnuELEetyhYxR7QCPexNJ83lyBpWPmR55 L+2aGsEZ6f6DkrCRDCpaDADYUJvAysKb5XTjOMxo4TjKvZUfXOuG9+VKtnMTDsqL kQiu5/g7ETRlGRv6L6MDO325Qkftl5NK7+TYNTOWwUsIGOL7r1GnZZ8Ibry5hywa TVoH5Kj12z/1AjpI47HORFYpqevVmaJxp50oKgrqfdT0XyvryB5n1uRb5v5em4a6 jGlSTNzeUelO9jXG/oMFMAdmQIpouBR+Tf28P1UuuQaxNIlz Extension name: 11379n7c ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/0318A68183AD3849

http://decryptor.cc/0318A68183AD3849

Targets

    • Target

      svchost.bin

    • Size

      166KB

    • MD5

      5bab7e6528a56bd5d3a76d01ec3ab45f

    • SHA1

      4b9495fc06c67e4419a0cf3d70b6285e9808afc4

    • SHA256

      1dc818f51827d89a545493921f8648299f3eb367c1e0354969ccaa9df7ce77b5

    • SHA512

      7c59fca6ffa7d1fd55f7c2268c22193d48c4082277f95c882b1e7df93f011a86c036f569c5bb8dc0a83aebe9bf44df9e7f11aac99ea0c33f917e63e80c2b07c4

    • SSDEEP

      3072:EJMawtnGqtWoKeZC62aoNUSncs0whq2aWc54aF:+w9vteQJYUocfWLK

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks