Resubmissions

28-07-2024 16:34

240728-t3cqnasfml 10

28-07-2024 16:18

240728-tsfdsssbpr 10

26-07-2024 07:19

240726-h5sn4stdnm 10

General

  • Target

    ff6a62a956cfea3ed97e71f58a3554b1caaca3275d90ab5ac7b280aafa9c1cae.exe

  • Size

    139KB

  • Sample

    240726-h5sn4stdnm

  • MD5

    72d9db37db04e51f61fc7b3424a009d2

  • SHA1

    3be50ec5fced0b0f0e9f1795ecbafc7538f28426

  • SHA256

    ff6a62a956cfea3ed97e71f58a3554b1caaca3275d90ab5ac7b280aafa9c1cae

  • SHA512

    be13842d7b615579714ac1dab4f43e11207075a4a3d09ec2aae2c87727ccdde2dece33c2394b20e0e669cd03f8c8f42924bf8d6cdaf1ab9489d9b555fb1a4281

  • SSDEEP

    1536:+DvcP3aXhpshwVs5OE8yNcYQpG2ZZICS4AIjnBR561lQVMr3IgmffEbjQFOx9VG8:5lSVhaNcYMkgnBR5uiV1UvQFOxXGCH

Malware Config

Extracted

Family

sodinokibi

Botnet

$2a$10$CtL6MpBCOZZcR.aRU3GXp.pcFtg0joF6uPmmrKY0hC0o.x.alLtZ.

Campaign

4085

Decoy

sandd.nl

digivod.de

southeasternacademyofprosthodontics.org

resortmtn.com

mdk-mediadesign.de

tetinfo.in

fayrecreations.com

ecpmedia.vn

physiofischer.de

highlinesouthasc.com

antenanavi.com

blog.solutionsarchitect.guru

deepsouthclothingcompany.com

coursio.com

quickyfunds.com

atmos-show.com

pawsuppetlovers.com

hokagestore.com

midmohandyman.com

mmgdouai.fr

Attributes
  • net

    true

  • pid

    $2a$10$CtL6MpBCOZZcR.aRU3GXp.pcFtg0joF6uPmmrKY0hC0o.x.alLtZ.

  • prc

    sqbcoreservice

    dbsnmp

    mydesktopservice

    outlook

    ocomm

    excel

    mydesktopqos

    isqlplussvc

    onenote

    tbirdconfig

    msaccess

    encsvc

    infopath

    steam

    thebat

    agntsvc

    sql

    visio

    wordpad

    winword

    dbeng50

    powerpnt

    firefox

    xfssvccon

    mspub

    oracle

    thunderbird

    ocssd

    synctime

    ocautoupds

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    4085

  • svc

    memtas

    mepocs

    backup

    sophos

    sql

    svc$

    veeam

    vss

Extracted

Path

C:\Users\i17byn6r-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension i17byn6r. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/485856571BE134D7 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/485856571BE134D7 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: B5qP9CVrOmvSyFAo9nxxXoEeMFSjo+E12nOACZZUjS2HtWJ9/Xp/m7FnkLXR7fm8 zx/sEJJ7X431TuZw0G/JaWE6ymJY7GA1jQ7byOBi2Z0D71PlCtrv5UH9WxiDT3LE DF22B48x5Htq0GsPXLAjt2RkfrW+zi29jBztxGPfZqRjMY+BYFGTwLrM6vRSSeuu 22J9ckFiHTkpVokplXuCzr4sZkE2OYX7TjgwHUdcbp/4XSh3ISyAztcMJyGgNpth A4+7xtsZ8y1tnAUZ88FLWYs9ZNunO/8+yWWJ1YOOJNk1ggWMyis4rIiO03d6LvwT q0FmpqrFdroda2ZGBVZl4Vu/VA2lYoYohdl2NLIjWPJ+mxyZ060GpVGrkt2ClIP0 dKdsDFhvP1sms59xd05zD120gJPTIbYldHn9TzBweq8imFUjb89fv1byP6CgeUII RdPB8a3GKO3BmdPuMdSGdnp6xf8AqwgmKAotqKDNGeJ4tOsAwn8L8fT/ezrL0eHI cSXYIIsenx//T9Ot7CL46K5hI7gvuCOVEaciuC6sGvusPbnfM/PUtgAfLtnTjM7R NtghTDFyAyiVEGs/Cm5gLzXd/2RolWfzhsFJa19hcdC1KoeBp6fE6qXEnso5AZ3v M9osknQqygZWq/a0yZPRCyhOmWQ4pMJRr3DA3wHQMXDUQyuxgeW9asCPFtgfVx/k KQHKUrrcs3XfUclhX+Tve6A5VhWOMIbdXawIEg0um9tb7FiX6N3NO5Jf5U5OE5SQ iL+eNqDcSzH61t13oLevKxsYVtIF7v8upMHQFgN5SbtPWyHc1H0CfaqTDVOLUbTK PmWGa8OvRVB57rPtD8mytXowOQtMbv/g3MRHVEDvANG+E0TvGLwAs1s41N4BlcXK jqLYg33BA2Fud4RIWipcPydWfKyIC8Qs5B1Lo5Fqsn01mSMau85EfLtRh5DQa47W 7G0oonhNHPns0VQLbqlV8ARju1HPgPkEdWQgcjVHNpG7TqholJVYymS2I+b4bHrI 4RtyUWURcXtAD8XoQl/ZP12SvqHSdkDx6zucIvjMFJEmiGU0cDI9pswD9A0mBnNy rmBMwKJsdsHZPXGge2aFV0SGhQLkV38iWdaOBt3Ra2prIZPmGubQj3m/QcOLpNDq cVMnVpx2C9uh7Ysvp7g8BD0uCGv/ujciatwKkiqgwv+3BI6d1DxlvTWsCzGhc1TF rlWtlOCnUe8bhcGHSGeYi4w4H/u1K+tbgAWs86WkUDgIllhexXFuNHEAwinUoo+l PyM/5zunxGeCj1/rVrNrFbSFcH3GMOpZ9/Y451gt4TzZIH4yTveCAcQn+ifhBA+4 m4EYV5xMTr0o1fShzxaIGD4u5Es4YrR4QEZ+jxUC8eL+INZZ ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/485856571BE134D7

http://decryptor.cc/485856571BE134D7

Extracted

Path

C:\Users\175o9zkh-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 175o9zkh. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/ED7D1550483DFC44 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/ED7D1550483DFC44 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: 1B0F7IP8NV+cpjhrenD7e9Mdk8GPoVLGWPOSNomOcPsS3Ep3U+SKK8okGHC42p3R /N45Je2RNJrf7Wj+rBIx5qyQQRAlofikX+Pj5MObVFKfFVF9bDXUVKa+E4e5UIqc PJm4xPiq7aV91Czvp1sJ/ddlmypojnI5MlpaaxNxeoMP5tRiGVf+yYV6gHabvDQB XFCt+kpYHc1c0pgvCzwP/4hHAs4pOXggN93Ej2fTu/nJNLdt9DDJFyGQkCeKRtGT uDAWkFzqaelMFeOqf8yWVtBiLYnSjO8/pUCJ+XiE1QmD3mtKOS27RLSfsjK8ZrAI B0h9RDLXxDbp5N1dsOe1cqSl/+wRZ6TARFZI2oXXCn4Yi3qgvVWEk9NQ9hKzG8ob HAb0yjg7IQ8xCA4o4CkzlesScbJuTL0oa8mgtKgFfRKIgxw2LoDYfPRssCMOvswM L2N0QiDzy4myzejSMRZE0R7H7nk/qlqxvc2/GDpcRqYPdhDj9aPhIux7j5tLwnNF w/WgRh4euSZ17jMRAHr5MYxBGlBfG+bj1qw0okMg+1kq9byEQzg388DwZ494Pwk2 2nOPe5E5KjdD21nXQYE9H8gtZAtivOUvufvdZGyATJAfarv+the1Ysw4j5L7Frw/ /nN5rW7Z/teeP9a/tlBXVIpGwLFoYRI7rcwPwQ8yiomUk9uAUp+ksEmVnqH1ZPyy jX3k8yNyyZzFPcRVN+06xQaYMilq3MOkv5cQnT4F/q878ZcY8bzTXfNyhhGNcDrT SabKZayHjSFSDydEu3xaqrrGdqUHi03+ztGpXfge+Nj3KLQRq93G0kzvTEigNpND Zu2IcHjAfX1RwVvjwipbj0acdbEDFGQWZQKiMymZjm3bk7qw6l+hy827/7JYqszP Q2vvVYe38a9NhnHOvhhELcS1L0rhA6YnOgtMQD7L6kQhADvxC3da/zomzSb0IxRN pvMBgClBEMfNxjiCejRvBtgJT1eL6BxZBegOYKxCmrx36GwMb2CQ7OGs6KLl/Hu4 +OB2dWBHwUg2A7ki5+HCeQwwIvbjFfxmWI0TfebJOy6XnZYtemyuwRmRYXa+Ix/x Rwxpa4sxAS7juMtCeys2PjZoqe0TBb8R3RsZlip3CUfZJYeJbkprCQd8deRjLZxU 8TsdK+VTbnLYAKfY/uWfKYgih0fCDWah7OqLD98raYjusicJM+jPX7t5FIL5viTw 4YoOvePLDDEIWozDZr7tRTcRqK9lhs9HzZHoqbyN/LmN7kDPppkFtI8Jmn+GnXoc ewOBZdpltlVIR/uCmeXtRRn+qychO1tIB+Q8+K/CVPHsfvI4R4yO9iaGl/F0qoIC ivkXlQNHlldAPMPsKJcnwi9p+31dWivLCIw84Paum61dZr2P3V7w/4C2 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/ED7D1550483DFC44

http://decryptor.cc/ED7D1550483DFC44

Targets

    • Target

      ff6a62a956cfea3ed97e71f58a3554b1caaca3275d90ab5ac7b280aafa9c1cae.exe

    • Size

      139KB

    • MD5

      72d9db37db04e51f61fc7b3424a009d2

    • SHA1

      3be50ec5fced0b0f0e9f1795ecbafc7538f28426

    • SHA256

      ff6a62a956cfea3ed97e71f58a3554b1caaca3275d90ab5ac7b280aafa9c1cae

    • SHA512

      be13842d7b615579714ac1dab4f43e11207075a4a3d09ec2aae2c87727ccdde2dece33c2394b20e0e669cd03f8c8f42924bf8d6cdaf1ab9489d9b555fb1a4281

    • SSDEEP

      1536:+DvcP3aXhpshwVs5OE8yNcYQpG2ZZICS4AIjnBR561lQVMr3IgmffEbjQFOx9VG8:5lSVhaNcYMkgnBR5uiV1UvQFOxXGCH

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks