Resubmissions

28-07-2024 16:34

240728-t3cqnasfml 10

28-07-2024 16:18

240728-tsfdsssbpr 10

26-07-2024 07:19

240726-h5sn4stdnm 10

General

  • Target

    ff6a62a956cfea3ed97e71f58a3554b1caaca3275d90ab5ac7b280aafa9c1cae.exe

  • Size

    139KB

  • Sample

    240728-t3cqnasfml

  • MD5

    72d9db37db04e51f61fc7b3424a009d2

  • SHA1

    3be50ec5fced0b0f0e9f1795ecbafc7538f28426

  • SHA256

    ff6a62a956cfea3ed97e71f58a3554b1caaca3275d90ab5ac7b280aafa9c1cae

  • SHA512

    be13842d7b615579714ac1dab4f43e11207075a4a3d09ec2aae2c87727ccdde2dece33c2394b20e0e669cd03f8c8f42924bf8d6cdaf1ab9489d9b555fb1a4281

  • SSDEEP

    1536:+DvcP3aXhpshwVs5OE8yNcYQpG2ZZICS4AIjnBR561lQVMr3IgmffEbjQFOx9VG8:5lSVhaNcYMkgnBR5uiV1UvQFOxXGCH

Malware Config

Extracted

Family

sodinokibi

Botnet

$2a$10$CtL6MpBCOZZcR.aRU3GXp.pcFtg0joF6uPmmrKY0hC0o.x.alLtZ.

Campaign

4085

Decoy

sandd.nl

digivod.de

southeasternacademyofprosthodontics.org

resortmtn.com

mdk-mediadesign.de

tetinfo.in

fayrecreations.com

ecpmedia.vn

physiofischer.de

highlinesouthasc.com

antenanavi.com

blog.solutionsarchitect.guru

deepsouthclothingcompany.com

coursio.com

quickyfunds.com

atmos-show.com

pawsuppetlovers.com

hokagestore.com

midmohandyman.com

mmgdouai.fr

Attributes
  • net

    true

  • pid

    $2a$10$CtL6MpBCOZZcR.aRU3GXp.pcFtg0joF6uPmmrKY0hC0o.x.alLtZ.

  • prc

    sqbcoreservice

    dbsnmp

    mydesktopservice

    outlook

    ocomm

    excel

    mydesktopqos

    isqlplussvc

    onenote

    tbirdconfig

    msaccess

    encsvc

    infopath

    steam

    thebat

    agntsvc

    sql

    visio

    wordpad

    winword

    dbeng50

    powerpnt

    firefox

    xfssvccon

    mspub

    oracle

    thunderbird

    ocssd

    synctime

    ocautoupds

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    4085

  • svc

    memtas

    mepocs

    backup

    sophos

    sql

    svc$

    veeam

    vss

Extracted

Path

C:\Users\hjs9v3znm3-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension hjs9v3znm3. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/D423B7B2EECD90AD 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/D423B7B2EECD90AD Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: 1W7V1sXW9chsZL9kVr+5eOg540y1rHKz5eH8e25FbbhzgSSNakm/Bex76ut6kPLk VM8y9TP4m2yhkdEqBZuf7VV+zIEuvtwLuDGHfuOblGUTE7GJbyEnldmg5ViT+lRl qLkyOR7h14LY1MjDac7p5eCGsfwwaVsPUsJCJOl0jo8JAYKASl6sc1pcoDPzFiTx vzIdfNMqSMhLOmxaDyKQ4Vv7yn7k/JieQfUMUlJjdT+heufNk9GDBl2nrYNEUJ9K i6BnKOvSzD5Y71Ku9R7x4hfxup3oIA29OYmFNs8H6B5jg0iwOkGHN84GXTgtAmdR S/tmXhSc2VR75DJd/Lv6+s6eOD0DZcQE49TIyrwlY6Hwp0NDEwu/gBxqIoiuWhOS pYY6Hb7Km1lQPA+Y7TUpGs8t+Xl3JB/0Hyz4oD3mb/RksRLEgkvLu1Y487fyDmxp QXPJ/LsXyA4k1jIJI8ACsRmVt8AvGRhPhn3Ik02ZaWHZdf80gGUU2TAMZtUJ9eH3 ntGuwrTbCR6vVc5b9ihFq5+RPkDmB//U1oWueiyrj+fvZe+ggtYn264aoHoc1tGm 1NBTSsF+bXqdoG6FJ8XowYJcOel2a7bZafZvgOpdcfbsce2sg0iZXBRiVJZJvkDX phuStYjx6K7zFR3HsjMjy7OVgikCH2Fl7yJtCOSODK5sXI5LaK8k6PyG0IDN6rNv u2mRjfZYxSZutnYhCTnhu9OmI/+PbmSv/sQ3tID3rQuO8h+23LYLHc18+mT73ihN ++RQewwTzpB0FsopKoXPiv0WmlKH92cyCxOE07SDzagjL91QYXsxUWEQWC+qul1U g3/6JzO0ZMPGoqdA6A/PbS8VqwT/cR+pWE0IR1Vo3YC1AFvWO84KJFDKEXAHrUZR Gj5ILunGyOkORLXP74VW88kVPnYxSmwZLNdAwsQWPWEuKB9PVa4lrLtzVxgWawYe rO1crNmt1exFkJyX6t/PaXtkfa9y+n7/zG4WWeYjxm3qiND7iH7Au/3IAucFgq6W QV4D3/JoJHh5BssWGHD3y936Uc0dBlo6j19V3/tZfphG0fM3DDWc3I4zzXZPfXIS 18T6G22aLUICc4RqESxvPWPLQPCwZQlqyivQEgGpnXY8+hKLOW3I4oGfQ2O0Paqo cpXLl/l6bUBTG59sdRWnLBXU1FpjqB6RG1/E+rtG+XkReeMIK25pFH2Bkm9knrnV L0TmLEeqhxDhuwjO1d9MteAn3+NIUK/BpS/sVC/pqImYQriUARxKnPeFmA4dXswV aX1lZgt9jF3Iiee2j3bqlRn68v4qrQLkUZKDRomgbXtIu3QlFIbshp6L6oo8BsSp phd9Pmhya5DNnmxEr6UPxNyvTTDomw2jkIhjOjl6RkKynZSsm+/QlA== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/D423B7B2EECD90AD

http://decryptor.cc/D423B7B2EECD90AD

Extracted

Path

C:\Users\8w8kz1-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 8w8kz1. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/525CA20A28D1382F 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/525CA20A28D1382F Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: XcHTUcyvK8W6z4FE79dD+RYAcUobNMfN/U4pmpIe7IISYsC57rYUV827gicKSn/I eple3UdxGBwZxfqbHdUBNKauBYsxaHEVM8LT5VmHUaXcjaSxwEgDR7y7wO581bYc fxO0KSAxAzXRPDzhsyT30TrvJ+15odNZjSPgg4qCAs/i9jNUnmRITuIq2apJ/Sjs w3MYNDhD8LCuUX+MmCnDtoN6V0smdQnsY2sKARl8S6VT1eroIHJP3Ceywi0sysDl M//51BQe2ioCcaETRuxjQOjul3q9j3yhiA0Xz4W5EF7PFNL0OOTdEnBufahe2jtb YvvRdBjO9WTABnLW2JQoPZ43R1lT9BK2XeUYjpiBHA1d9ui5BLuxjOZI584myQVn q82YnxuvxQ4n6sCrk0nEY/RICd5BCp3epoYDrk4vsgbL18O6QAD/zJq893XCsB// 8R8yDFO/Ss2iWmUVFfRtUxxoVhuSNcTv0NSkr5OgmpnY5Sofk/CsIryPnXvvGA/v TlDl5Xmr2LDo4bfRj0KDrLifkbZIKJQaRKcOq5+tiIwXBUcr2lS2F7HpuCUWPk2c lJOWeW9TvN1AXDRi6/cNnT6Q32CXdq221FVu3Z028rWqgfyLkt1nZw0mxNYcS9dq A8MuirLm2vNxRymCVSR+on2C5Q8qNcD6b4JQ7xaS4RPT947aBvuAfH+ZuN/kxSLS s75vBX/9TXMXFf2fFuNASSQySDvg1HxUgDnMQt+cgnG9DS3YTc0VXf+UpO7yvKdn DRbYWtxCjf3ZJ4USxvWdEltKHtFbaOKnsUiUpL6rwufLBHDBHfbM2nJS4gGTZcFg hNvim7Lrfqn6Z1TMIchx+i6dSZ/Ceo/krrNk3uJtCi9ESF+AUwz8MIBNtGk9rlDk zSPvKrLdfZBEK76Ll75ua4o2gdjYv9npsJ4HUQZ6dW4IgoJZ6KrAZKOWVm78dWjM ynnx2WjHCkOvaQL1d8KDSFgCpAH5LUhLbQncYbpFCjXMsZ40hl7N57MW4uOXQYqJ aFyIHlVS8zrxuhjYf10sFFbKObSDXXoWLou3IVUa4hugCukbHidYpNsd3T5ifZ4a d3Q979swLCTCBabCJAvb9YVuXLLrgxvo2N8KsfcCxo1MHQgqBytjsxBB0KDecre8 /z6wak+7BUkLdePnzK090R52qQgvmA0TOt7xZfX3S9dUmjvlTYnb/LlpQjAC33rY A2dGwd8JPxPefVkQ6WLSlBFtsOnNt5UlSku1RTN/uxdCiBovRP1ZjHilNNgzdAA9 SHh/nsD5BvsorfI47yX4984/BTaMubDhfiw/RycVWE2gDxC8lumgJmh/1GTxchRn KLOvHP7IiYwQJLFxAoqDRW4NcAYTSN1Ae9zwM9qL0AMf01PzCgU= ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/525CA20A28D1382F

http://decryptor.cc/525CA20A28D1382F

Targets

    • Target

      ff6a62a956cfea3ed97e71f58a3554b1caaca3275d90ab5ac7b280aafa9c1cae.exe

    • Size

      139KB

    • MD5

      72d9db37db04e51f61fc7b3424a009d2

    • SHA1

      3be50ec5fced0b0f0e9f1795ecbafc7538f28426

    • SHA256

      ff6a62a956cfea3ed97e71f58a3554b1caaca3275d90ab5ac7b280aafa9c1cae

    • SHA512

      be13842d7b615579714ac1dab4f43e11207075a4a3d09ec2aae2c87727ccdde2dece33c2394b20e0e669cd03f8c8f42924bf8d6cdaf1ab9489d9b555fb1a4281

    • SSDEEP

      1536:+DvcP3aXhpshwVs5OE8yNcYQpG2ZZICS4AIjnBR561lQVMr3IgmffEbjQFOx9VG8:5lSVhaNcYMkgnBR5uiV1UvQFOxXGCH

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks