Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    28-01-2024 15:34

General

  • Target

    2024-01-28_f6b80e5767a8d2a0fde125625f8fb3f7_revil.exe

  • Size

    165KB

  • MD5

    f6b80e5767a8d2a0fde125625f8fb3f7

  • SHA1

    3f207c89074333bb7ee455cc31939b3d8424160c

  • SHA256

    fc94ede7e8d4d20959e5a887635f3daeb22e80b8ba317bba0ab459f49d26dd95

  • SHA512

    71006c32e31fe22a73c450213a4d4ad2ed4e19824b420d0157d5882187ef78da15aa29995e363bc525d14dae32c9c8e27642e9dde9f8bf17dd403218cd10257e

  • SSDEEP

    3072:tEa2d8CfSXceqmPDucCWXq6pp2hUOYespeb+p4lJkldszg7:lCqlPDuKXqyKsAb+YJklduo

Malware Config

Extracted

Family

sodinokibi

Botnet

26

Campaign

2083

Decoy

kristianboennelykke.dk

mustangmarketinggroup.com

globalcompliancenews.com

chainofhopeeurope.eu

ncjc.ca

tothebackofthemoon.com

quitescorting.com

theboardroomafrica.com

julielusktherapy.com

wyreforest.net

indiebizadvocates.org

ayudaespiritualtamara.com

universelle.fr

gosouldeep.com

epsondriversforwindows.com

dr-vita.de

thehovecounsellingpractice.co.uk

alcye.com

speiserei-hannover.de

fridakids.com

Attributes
  • net

    false

  • pid

    26

  • prc

    ocautoupds

    thunderbird

    dbsnmp

    sql

    encsvc

    onenote

    wordpa

    isqlplussvc

    ocssd

    firefox

    mydesktopqos

    mydesktopservice

    excel

    xfssvccon

    agntsvc

    powerpnt

    thebat

    oracle

    ocomm

    steam

    outlook

    mysql

    infopath

    visio

    mspub

    winword

    sqbcoreservice

    dbeng50

    msaccess

    synctime

    tbirdconfig

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome Alliotts. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} Extension name: {EXT} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    2083

  • svc

    vss

    memtas

    mepocs

    veeam

    svc$

    mysql

    sql

    sophos

    backup

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-28_f6b80e5767a8d2a0fde125625f8fb3f7_revil.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-28_f6b80e5767a8d2a0fde125625f8fb3f7_revil.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1152
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1152 -s 188
      2⤵
      • Program crash
      PID:2404

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1152-0-0x0000000000AE0000-0x0000000000B12000-memory.dmp
    Filesize

    200KB

  • memory/1152-1-0x0000000000AE0000-0x0000000000B12000-memory.dmp
    Filesize

    200KB