General
-
Target
2024-06-12_2064ef527e12bcbe467ba9148dd5b907_revil_sodinokibi
-
Size
156KB
-
Sample
240612-lpkkcateln
-
MD5
2064ef527e12bcbe467ba9148dd5b907
-
SHA1
30f495e281ecfcf95f1bebde8c9d8e486c14a2ed
-
SHA256
c5815fb72035e77992ae38151ce02635ec21ef53c44c22403b6c426bc6695025
-
SHA512
ecc284817cdcc8ce975f1bee977f67c9ae60e2c3d4b3efe51353fc43f5f4ca19f0fde5412b0fab83c46f23fc5d0ac0f115e3389cd60d78a2825502e8b6a4f35b
-
SSDEEP
1536:LVlo4vFAPi8hnuy8Ey7pAe3U7Pbi4eTMluxtXDCntTnICS4A33eKWKOgwoAN61Vj:Ui8Iy8EytSLbi4eTMlwDCnuZ3N9w0IE
Behavioral task
behavioral1
Sample
2024-06-12_2064ef527e12bcbe467ba9148dd5b907_revil_sodinokibi.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-06-12_2064ef527e12bcbe467ba9148dd5b907_revil_sodinokibi.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
C:\Users\Default\r6lz18g3l-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/9B0A1E114B0A1C8E
http://decryptor.top/9B0A1E114B0A1C8E
Targets
-
-
Target
2024-06-12_2064ef527e12bcbe467ba9148dd5b907_revil_sodinokibi
-
Size
156KB
-
MD5
2064ef527e12bcbe467ba9148dd5b907
-
SHA1
30f495e281ecfcf95f1bebde8c9d8e486c14a2ed
-
SHA256
c5815fb72035e77992ae38151ce02635ec21ef53c44c22403b6c426bc6695025
-
SHA512
ecc284817cdcc8ce975f1bee977f67c9ae60e2c3d4b3efe51353fc43f5f4ca19f0fde5412b0fab83c46f23fc5d0ac0f115e3389cd60d78a2825502e8b6a4f35b
-
SSDEEP
1536:LVlo4vFAPi8hnuy8Ey7pAe3U7Pbi4eTMluxtXDCntTnICS4A33eKWKOgwoAN61Vj:Ui8Iy8EytSLbi4eTMlwDCnuZ3N9w0IE
Score10/10-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Renames multiple (169) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-