General

  • Target

    2865ed46578bf51a1656064c7375b94d_JaffaCakes118

  • Size

    166KB

  • Sample

    240509-fmb8aseg68

  • MD5

    2865ed46578bf51a1656064c7375b94d

  • SHA1

    fef692d2dcfc799b7399d88372fc5470c1ffc8b2

  • SHA256

    ba11d5592a54787bae50a01afa3cef0f57b67ac4ba603525abb56d3260a5b6ce

  • SHA512

    6b491507bcbe7259f59c3a1079e9bc02febe007e30a448bec1c1f4bd9e1ca4b646175c46eef83df3c4e084049b9228390674e6dcae737cc2bca7a3c70d6b3728

  • SSDEEP

    3072:MJMawtnGqtWoKeZ9fh1CgnNto6jfmVvdOyY26bL:Ww9vteqJggn7oUfodOTL

Malware Config

Extracted

Family

sodinokibi

Botnet

$2a$10$N20t8s7OgWv4WO/q032GA.eskARYgAQ4QTfqnV2CgYyynG/diTvgm

Campaign

3763

Decoy

iwelt.de

web.ion.ag

enovos.de

pinkexcel.com

fransespiegels.nl

kisplanning.com.au

daklesa.de

allamatberedare.se

lachofikschiet.nl

theletter.company

limassoldriving.com

ziegler-praezisionsteile.de

wurmpower.at

i-trust.dk

stacyloeb.com

figura.team

chaotrang.com

rerekatu.com

norpol-yachting.com

abogados-en-alicante.es

Attributes
  • net

    true

  • pid

    $2a$10$N20t8s7OgWv4WO/q032GA.eskARYgAQ4QTfqnV2CgYyynG/diTvgm

  • prc

    mspub

    mydesktopqos

    dbeng50

    sqbcoreservice

    steam

    synctime

    infopath

    dbsnmp

    firefox

    oracle

    ocssd

    encsvc

    ocomm

    tbirdconfig

    agntsvc

    sql

    powerpnt

    thebat

    winword

    thunderbird

    wordpad

    xfssvccon

    onenote

    outlook

    visio

    ocautoupds

    msaccess

    excel

    isqlplussvc

    mydesktopservice

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    3763

  • svc

    backup

    vss

    memtas

    svc$

    veeam

    mepocs

    sophos

    sql

Extracted

Path

C:\Users\10y625-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 10y625. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/6D4444FB4423B5F8 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/6D4444FB4423B5F8 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: eSd3tcR491QAAQlSWJESoY/eYwKDh2wKE9kXO8vZvhRGGP7bDRn/wxZE9rBtusgk bPUhGZp/q1L4DJKR29UODN5YrfIa8C3dLwa5RmbktlHBmTJtBICyrX7i1qnz7xVZ LImnBe/yBguHG64VwvwLFcOC6gyvE3Li/Q4GuLh54R6QrNhZ7hdvVEXHlhpdMyAM kBA+XLV2+cskYkqakDxhKNjt+N4ppGIwMtTSMrIxCwFugnS4KyqUuwlGdWuNO70N 4rvWA1qs6CKoCHtrtt2pwTO8yur0jH9rblkGV9/u+G6oshYqMKx9GI/p4Y79OQ0S 1JSPrI5NYus4VyqgHqJEfG9cc0qgDGTep4FwRB6dBKwWsZveTuuJecH7WXniblg0 TfME0ixI9LDTTyg21W2QJJzQyDOO7eA8HpowVUcG+ruvjdOUbHdtsOeCYlGxJbeD DbjDKy4qDCmSh289pb4iplv3vaQ6Jo3RyNLcw4V7+hs4L+Ot38vaMEY1yAD2I7va W8pMqYS8Tl0EDr3yMh8zTGD0EteXn00ShVlqMOYJiuhIr5InCoGRBskKkRK0NY5y Gh1/FGWp92R+jlSPm8KXyvmIal/xJYRzVDboIPKutc4o96i6bsgqxkX/R61lvucR TrdI4GB3Dnzjt70IAY+OHI15HtSIYKtlq3jspGJOVy0hEiD59J3hvxkafdR32ZJT UzhRvMuAvBSRVRSL9Ul1LYRvjyGGCuJsOBbcDYzpmgLpInVZsaq3zQ/K4R1XqxQD Aztx4OnAEuO966iWqPNHZ7UOKv/eyAdZGekOgqtIoo5oVsN3HbMZZjmBoiGA8j8Q y1XrA1RLUQftqs9tGNXP1vfSOOCrmSDXMb+5AYdpW2j4WApSy2Z9QWlKVG6aVsXD NfUuIkE5QrbEslEzNNtlFaurORFxpXI2dtNP7dIGhJReT6qBqpHzEoK1S1kXQTip jb6fbdeB5UP+yXIju9fsHDEISMPbFFmiMONEXsqAoI8GSJDRDUS51Vn9BvzjuyQm 6hVkrlPb0mxLC2znWDrT2mEZSMAJRVGl8BFysXSbVzSUeDvjHggGOs6AfBqLhanb bfowtY8iribAzmgqgebc0Zk3byXpQojxJRRSkj2Zsp1VfSssz2iqIqaDr66LPiUH wG4QIGiSbA5uUEZIGOv2dD0CdtzxNKcZF2Vx1aM/VqkKhoDrQtfClq4LZnEpcReF eK5RltFsvUDag7jgQ+AW4IQsEk47x1y6KN/DvCpf04hr4JpY50GOkpVgrqiXbujr CoswT4u7ahy0/kJb8K+Da/Cmr5XhXvGc9VT9ujZY0r3VIGGsdnR86PFtrOLjWEGB 6ym5mCpUnPAqeTYqI/kPqxhNeK6mwNNSPVpsCH8LOrmCML/MjAw= ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/6D4444FB4423B5F8

http://decryptor.cc/6D4444FB4423B5F8

Targets

    • Target

      2865ed46578bf51a1656064c7375b94d_JaffaCakes118

    • Size

      166KB

    • MD5

      2865ed46578bf51a1656064c7375b94d

    • SHA1

      fef692d2dcfc799b7399d88372fc5470c1ffc8b2

    • SHA256

      ba11d5592a54787bae50a01afa3cef0f57b67ac4ba603525abb56d3260a5b6ce

    • SHA512

      6b491507bcbe7259f59c3a1079e9bc02febe007e30a448bec1c1f4bd9e1ca4b646175c46eef83df3c4e084049b9228390674e6dcae737cc2bca7a3c70d6b3728

    • SSDEEP

      3072:MJMawtnGqtWoKeZ9fh1CgnNto6jfmVvdOyY26bL:Ww9vteqJggn7oUfodOTL

    Score
    10/10
    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks