General
-
Target
2024-06-13_ade8979d58960b5214d80e5a723e2779_revil_sodinokibi
-
Size
156KB
-
Sample
240613-lx4yysxfqm
-
MD5
ade8979d58960b5214d80e5a723e2779
-
SHA1
b49e6fa430d3fcc559236a440abbb99b6efd003f
-
SHA256
388d21a5e711ac53519656a0fce9cbd8d381300c0877b4978bc0792d233bec7f
-
SHA512
3e76e9fc2048d7d835746d4452f72602c852018fb5db7eb271a74cabf391c3fdfcef3ed8c6ee377c040f1de0ab05021163888598d3a18ecb3832fed3fef55537
-
SSDEEP
3072:Ui8Iy8EytSLbi4eTMlwDCnuZ3O8VN96b:d8IUykbnWJZ3O8V+b
Behavioral task
behavioral1
Sample
2024-06-13_ade8979d58960b5214d80e5a723e2779_revil_sodinokibi.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-06-13_ade8979d58960b5214d80e5a723e2779_revil_sodinokibi.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
C:\Users\Default\jdpr3.info.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/7257CF149BCE8973
http://decryptor.top/7257CF149BCE8973
Targets
-
-
Target
2024-06-13_ade8979d58960b5214d80e5a723e2779_revil_sodinokibi
-
Size
156KB
-
MD5
ade8979d58960b5214d80e5a723e2779
-
SHA1
b49e6fa430d3fcc559236a440abbb99b6efd003f
-
SHA256
388d21a5e711ac53519656a0fce9cbd8d381300c0877b4978bc0792d233bec7f
-
SHA512
3e76e9fc2048d7d835746d4452f72602c852018fb5db7eb271a74cabf391c3fdfcef3ed8c6ee377c040f1de0ab05021163888598d3a18ecb3832fed3fef55537
-
SSDEEP
3072:Ui8Iy8EytSLbi4eTMlwDCnuZ3O8VN96b:d8IUykbnWJZ3O8V+b
Score10/10-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Renames multiple (148) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-