General

  • Target

    3fdad99a17a6766fe396081f82394f5e2da0142651427da64a5b6e28c9df2fd4.zip

  • Size

    88KB

  • MD5

    ea49eda71a704e739ba7787a6e16fe56

  • SHA1

    916a03fce9f5d8190b473e2dd9f8f22e6a18b61c

  • SHA256

    aa55623b2b9beb2db0e5a36a8d6d6b802a143b28d98a78289cfc6c6c7bf4375f

  • SHA512

    435a8a7fdcf409cc86fbf62a3ee6b3101be69cc8e9cf1ad223ba2fd1bbab2ae6221cfae58e4fcf3408440c664f071e698b1453282ea7c1de4a28862e165b2ceb

  • SSDEEP

    1536:CCeClJb9Fafcr0m7W51ULlSLMO410IlpXyRrDtXNd8+zBgDE/AdAy8ygZk:FJlJhIfcrNWgSoO4nZuF/8+AdCygZk

Score
10/10

Malware Config

Extracted

Family

sodinokibi

Botnet

30

Campaign

128

Decoy

factorywizuk.com

triplettagaite.fr

leijstrom.com

zaczytana.com

suitesartemis.gr

fanuli.com.au

ya-elka.ru

khtrx.com

condormobile.fr

salonlamar.nl

maryairbnb.wordpress.com

neonodi.be

pureelements.nl

brannbornfastigheter.se

energosbit-rp.ru

citiscapes-art.com

geitoniatonaggelon.gr

redctei.co

biblica.com

pxsrl.it

Attributes
  • net

    true

  • pid

    30

  • prc

    ocautoupds.exe

    sqlservr.exe

    xfssvccon.exe

    mydesktopservice.exe

    tbirdconfig.exe

    agntsvc.exe

    excel.exe

    isqlplussvc.exe

    dbsnmp.exe

    infopath.exe

    thunderbird.exe

    mspub.exe

    sqlbrowser.exe

    winword.exe

    sqlwriter.exe

    synctime.exe

    encsvc.exe

    mysqld_nt.exe

    firefoxconfig.exe

    sqbcoreservice.exe

    mydesktopqos.exe

    outlook.exe

    oracle.exe

    onenote.exe

    visio.exe

    wordpad.exe

    steam.exe

    ocssd.exe

    mysqld.exe

    msftesql.exe

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} Extension name: {EXT} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    128

Signatures

  • Sodinokibi family
  • Sodinokibi/Revil sample 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3fdad99a17a6766fe396081f82394f5e2da0142651427da64a5b6e28c9df2fd4.zip
    .zip

    Password: infected

  • 3fdad99a17a6766fe396081f82394f5e2da0142651427da64a5b6e28c9df2fd4.exe
    .exe windows:5 windows x86 arch:x86

    Password: infected


    Headers

    Sections