Resubmissions

30-09-2024 21:45

240930-1l2rsazhpg 10

15-09-2024 22:03

240915-1yl7vsvbpf 10

15-09-2024 20:03

240915-ystcwa1elr 10

20-08-2024 16:21

240820-ttt9cawalj 10

24-06-2024 04:58

240624-fmba1a1djm 10

General

  • Target

    v2.bin(1).zip

  • Size

    73KB

  • Sample

    240305-dw4ykadb7x

  • MD5

    620fd461cab821f478f7cce1bf06d1ac

  • SHA1

    a083516b5a275a2e9141f68a99ab4878632c5552

  • SHA256

    f442d0543f6df79be9fbaed90af2dedbcf2e4774561421763577b148a9ff8554

  • SHA512

    9ad7d4f17e156e21885c89b242430a06652ea8bdc45b22dc64f23efe8c2f6391ac5556c5e2bd14cf46d5bd8cb8dbb89f714466eef348dcb19ad16f3175dd3117

  • SSDEEP

    1536:yJrdZ1PgFel3BJmc11f0MPxwX5o2CfFGm8SXZRObA:yJJZ1cKxJm+bZGCfFjpRObA

Malware Config

Extracted

Family

sodinokibi

Botnet

$2a$12$lTqvWf.cQvh9W5jZkAk9LO0hMLnifWtUFoBJ86Ge.hLZGVClg6xhW

Campaign

7563

Decoy

commercialboatbuilding.com

parkstreetauto.net

longislandelderlaw.com

lbcframingelectrical.com

assurancesalextrespaille.fr

smale-opticiens.nl

naturavetal.hr

global-kids.info

kaotikkustomz.com

klusbeter.nl

socstrp.org

stefanpasch.me

jandaonline.com

beyondmarcomdotcom.wordpress.com

nmiec.com

sabel-bf.com

edv-live.de

zewatchers.com

controldekk.com

berlin-bamboo-bikes.org

Attributes
  • net

    true

  • pid

    $2a$12$lTqvWf.cQvh9W5jZkAk9LO0hMLnifWtUFoBJ86Ge.hLZGVClg6xhW

  • prc

    oracle

    excel

    ocomm

    onenote

    mspub

    powerpnt

    synctime

    agntsvc

    dbeng50

    isqlplussvc

    firefox

    mydesktopservice

    steam

    winword

    dbsnmp

    ocautoupds

    thunderbird

    sqbcoreservice

    ocssd

    encsvc

    xfssvccon

    tbirdconfig

    wordpad

    infopath

    visio

    outlook

    msaccess

    sql

    mydesktopqos

    thebat

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- We will use the data gathered from your systems in future campaigns in 14 days !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    7563

  • svc

    veeam

    svc$

    memtas

    sophos

    sql

    vss

    backup

    mepocs

Extracted

Path

C:\Recovery\79osy1-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 79osy1. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/CDDA7A4B7AAE4DD2 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/CDDA7A4B7AAE4DD2 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: MmoCaLG1lON6XAd4/+XEmgnxD3/Jmrg7pIwwwIGqzbhWz6I0Y1O+l3P7VR6nM7oS IazpLRH5yQ4e7fp4O9AErVQ4Cd6IvgBEpiURgi7cPNzUsP8Np0N0fBGJcTLC1Fvs PFuDSrSx3LQjAoyF2N/AZ6dXYxtcU1NCOpNw48ZGqFqnUlSVfg/xEKidYd04kB4f cLXRQ7sDwx1+ybUNeMrUmLZnsEAg4HPhd1G1Sj1lY+aFUPhb8ZAQKTMuCLolPAhP P2eQrSfkYYMy6LDwbyLB+IzsunGLhlfpaFU1Z4CHUF+0AGT3Hr042NWHXIVI8QDw TKiCTrrLPnn0E3P8IJ5/qcZdg+NfK7ScuIEGhDEUhelj9F+yw2mYiVDwQiKvdeTl QcbKZ0c01qmICvNQMJWzrF1eZGf02SuTztZsyadJX7Z7N/ksRSCYbTWRgkufSYTg Rdkt8yCsE5pPqjlmpfVpFJWEaZeIPk4n1DZKGYbMvHdDf7jiHHutxg/0wwAa9oDw psClijZ8Sr/4cmLpJPJF6ehbBqySU+bHbTMJsg8np/T8qcUVEolR0rK6Cl1C2nQs 9/A1T01qlzY1x/GvAQr3TnmbqeKVw+2tq4R3DAdA+wL239YJZa/f6woeHf7wPlft BoVOBZ+q493ERz/CUHxUk7mgvsYXWabHHe41hcRo2JAFpXt80rX6/l7WV4UhV+9o ManUluCn8jL2bYcpo7EfNi0BpRsre3KFee2lu8ssawdl2hKqSdt9s6zgzlA3K69S qDUSVh6KX5BMuu3b2T+hhpn7SwQXLDfrdwG9MKHwm0CxnrpIEiaYRie1fP/5KQun oXWJiTiVUmXZQvvMU/jgOQdRgfqNHb9ilGjpNVi3LE/X3seeUPIFSxRo285cIJQs wbHDDB0BnlsoEQLltRBquCkPcpaV2pMyRMM4TBVs/mrOqfBIT3UFrYuDlcUhzMVG imfuUmFMXSqqOX2Ojg56zm0LINzFzjwvg8lcGy1Yo9Wj/EoJkbuuTOCr/IuqDxM5 ZgHzluTTEYWV0LTFD6LXcTOfFl+5q2kkiPVEQ5MQXbEiNVW2HT9OEaf28e2fqHaG Gvww3WK3Bhdmmi+EfKbxPRDuifOMgA5U4aDV85wt/g4LqMWxD/cnspH6aQhD8WTW PhybRN0Inloq9lnprtqA1SWjr2apj9sx3WNDQArdiGvZMWRPqYADJG0bmMt2X64h CCSgF32g1FmWcR1nAJsb5P6g5ueN8iNDgDj2MxljkJGNr8CnbfZ3OG5t7KacMq0J faJHAKWfLeZh1cb92mwtSGTei0U6LGCbr9HhpS0TduuVp77EQBSVMsGg/O5cMScR 7BYBjXqTNwvqzxpEpMxgpuqm/3/ulg== ----------------------------------------------------------------------------------------- We will use the data gathered from your systems in future campaigns in 14 days !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/CDDA7A4B7AAE4DD2

http://decoder.re/CDDA7A4B7AAE4DD2

Extracted

Path

C:\ProgramData\4ill810-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 4ill810. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/11007FAF1E8AC359 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/11007FAF1E8AC359 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: 7Pb5C7vkiAp9PcI6d7XCv3M2OFgd0nqquaeaqcbQx73N19cZsYCUNhsO8lB+yrWw vi3kREWsMrXXlnglQ/n/8AFmtEbgkbzaTkKIu6tRChSm59WhDQBSNdNM4PHB27Oy ID8HrbCy8GCiXh8Y/1MLtvWddN5LC6ogMneAlI2HRKZp17VS9bMaIRLZWyK3mEyf UY9AM8HvLQb3hqX1on8wK8ZCPJlfRcyRT51gy95WDWYoqS6gwNqC4Wm0jmCdwJt8 lU44ebxeqHonVpHNerK5Bs8DsKQXueZwotDhOWjioj+Z5n1qz2hw48mEEjOwd3NF cEAIvfrPmuMNSmxTFuAghnUKMRIR830hnyBgF9/j9lHxBkScki1JBBSqb10O+I3+ ZXdBFOuXEIdopmwExv35O9NALqwMg2cRohSwBguuKNu3vMUjRcF4mMKJxEjk13A7 nUnTql2dd9P0rNYreF1F6xG5yKX0X2r/pJX6aNNRBbAvKOJWrWQKW+F/DzcqJoJI zDoJk5sWBYZ57EHPTJnlNDU+HR54CguaVinRBwlc9jid/d3Oloj73G7/MlXR3Y/j YVtDnyh4B+sLyA9hzhhge4dwIc4KP+oQXiNeZCG0dzXutsugwSUKTbJX3N4RHAW8 1zTZ5YgFHC8jHai9+8t/OldxlJDqoIVg1xydqkK7XYHjufPaO6YXPf6Wiepcphdm EB2080N6A5t0CsxT0UfFV1VZE3lyot8q9OVQHj0s8cWC5N+boyy71G6i8hD4Qc0t F5fgmGl9OP+9RSQ83sa1Jy6LoRSMfgGAWn6z27if/6myTJdKNtiZMqoPm6u4qVRX jmgMvM/qiGKIaqrnwdvGNP+NBQMXmobElSH/g4F0W7rbS7Dm357czGj4pGjJ3flT j9tXpfDTWaOb84HndgKkZ59Xt4QgVtjpCcJGk9iPeHH76XhKhrp1oz/OH/Itb5qE dtUwEQRBEKYn1Da7SS54WJBAo2JAIyL3rwxLtOQ92s4a3wQH5g8ouY6y5b/b63+6 PV3TuIVU2amYErW/cTV6LP9aOA5LiaVDnEs+dnFF/NKRikmAq637foXb2SaL6k8S euJVETG74qTZTeDLctcqYpKu+5zEwRoryt2FpQIvMVo5oaF9xfxc1JNnU7ft2MTu maX43U06ZAV5tkzwu7V3X+q/nRnrr3nMHrCLN+QF0K2wW+OGNRXO9w1+C+H11Sbs kWMQwCtTv68lPuxaov2ZPDtzZ2HoEjmuxBKZvEeCfOzayCjQOGjwoJWFPZRQIRED Mn7yzC5DrKYGfJYKj5ti2yqbZv6xDD2KVji9O5VwI74CbuQxGyuzfnEDmT3rf5lv IOOT4Z/JnATiUeTMTmBWiD3mGbNNsQDKLzk0j/xC ----------------------------------------------------------------------------------------- We will use the data gathered from your systems in future campaigns in 14 days !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/11007FAF1E8AC359

http://decoder.re/11007FAF1E8AC359

Targets

    • Target

      v2.bin

    • Size

      121KB

    • MD5

      944ed18066724dc6ca3fb3d72e4b9bdf

    • SHA1

      1a19c8793cd783a5bb89777f5bc09e580f97ce29

    • SHA256

      74ce1be7fe32869dbbfe599d7992c306a7ee693eb517924135975daa64a3a92f

    • SHA512

      a4d23cba68205350ae58920479cb52836f9c6dac20d1634993f3758a1e5866f40b0296226341958d1200e1fcd292b8138c41a9ed8911d7abeaa223a06bfe4ad3

    • SSDEEP

      1536:vjVXKif7kaCtHM7qpo6ZQDtFnNi+ti09or2LkLpLik8ICS4Ao3uZs/WVEdz725sK:J1MZwlLk9Bm3uW/Wud2K36cn/wCY

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks