Resubmissions

18-09-2024 11:32

240918-nnmz7azakp 10

15-09-2024 12:50

240915-p21c4svflm 10

15-09-2024 12:44

240915-pysh4atflf 10

15-09-2024 12:04

240915-n83ldatdpl 10

General

  • Target

    e2708d3c57b562b01da42f9e7549781f_JaffaCakes118

  • Size

    165KB

  • Sample

    240915-p21c4svflm

  • MD5

    e2708d3c57b562b01da42f9e7549781f

  • SHA1

    3d82951dbfab5629187b26ecb7388b7a05597f67

  • SHA256

    d976a41f366fb1e3a0a5d15878d84e24704949973d9e0ccead9a779dee03ef0f

  • SHA512

    c483968f981e64021025bf4f42424df3cfb88a55bd4cb7f2aa904515eccb85e239c3d44812b28d5b617b6b8476dcc3f4258465a211ae6e6725adbf1850234619

  • SSDEEP

    3072:eCEq0R0nZ5ys5n4Y9doh7O79siUs/NaxohzDKMlt:lw02sJPi7O93N3FHlt

Malware Config

Extracted

Family

sodinokibi

Botnet

48

Campaign

2047

Decoy

mrkluttz.com

subyard.com

fire-space.com

verbouwingsdouche.nl

cincinnatiphotocompany.org

promus.ca

ygallerysalonsoho.com:443

olry-cloisons.fr

parseport.com

mind2muscle.nl

lesyeuxbleus.net

rishigangoly.com

lifeinbreaths.com

kenmccallum.com

sochi-okna23.ru

ledyoucan.com

littlesaints.academy

from02pro.com

innersurrection.com

azloans.com

Attributes
  • net

    false

  • pid

    48

  • prc

    excel

    outlook

    powerpnt

    dbsnmp

    synctime

    mydesktopqos

    dbeng50

    winword

    mspub

    xfssvccon

    wordpa

    encsvc

    isqlplussvc

    msaccess

    thunderbird

    sql

    thebat

    tbirdconfig

    ocssd

    oracle

    infopath

    steam

    visio

    ocomm

    mydesktopservice

    sqbcoreservice

    ocautoupds

    onenote

    firefox

    agntsvc

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. CDHFUND. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} Extension name: {EXT} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    2047

  • svc

    memtas

    sophos

    vss

    svc$

    mepocs

    backup

    veeam

    sql

Extracted

Path

C:\Program Files (x86)\u6t0q306re-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. CDHFUND. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension u6t0q306re. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/0931195B664ADB5B 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/0931195B664ADB5B Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: F40vOr52erjLdykID+styObYF3fyBwq7RLtw8EaXzdrf1xosO/BEE5HIBnzM0Jub qyYt03JhU5BHCnfNgxtiKr15e8ykRuxziIUuGbEeVGDWNiNU+js2F60M3on6o1Nx +IncINneDGYFpIIjCYMCYgj90viZoCFi8Q8Gd09DJY5gyMP9spa+frMsD+BzUPue Dy2Ct63ukXEGnkVo87dlhDTsdrvOEFFGXVUbgOMHUbGQ2w3ri3fd212pz+kjAcf3 KbZiXaiVOyS/ZIdTm6wPgKYRFKz4VGnIthGEH7rKeChsXhtDJOm3dWS2moLf/+uk Iu1XRvf35TIa65eKQEOXne/zi2Hu93Cvi+WOI+MlTsLFuvRz6qazKuwgSwi10fAL zcPr3Hxh34Od57zFOZe8ZSPtG8QMvGEgQlYjEILaxlMD2O2/c8FpJMucTl8b1a7R 2sP+1JhrW1M+ex6RT9Lkg6QSLBCP2ERLbaR0dBhQRZGe6XsdKJpr191mafqspVTT wHvKFYgwZB82Zx5/Vde+hjJyqRCVF9lfydZPeGiZsoR2MVkE9ZGdlKevjolnTYYd 9ZaOLBBnWGxwMsbxjQT10pMX+Wnuz4b/FoGM08FLoQ++SpUKlQGICXWbMWDwVRQq qvmWoCWGX0Q3HQlRxWTY4DpQgN7Wc/mDn83hCW5VCfcw0ajk01fsi7g02IQ/MNWB gK81cc31/zNuV/F4VAjt4XeUVTLUTu7xEN9WlO54qnLulVRrDlUmMux7NMUxishR pjDiYGsWcrbYYOu6v644ub2QKwfe9+KRBJ86L2qUqtn2uIMZ5NolBnKLzfXoCyo1 K0KFWgT/pVCUKJopJ6tWMU0aRFp0Z3MK71T/HnE2by+loIML02eBwNoZHyaDj6Fe QeTz/4OrUQ3QmMVMYCzZK0Og7j85xWJCMFx5nnkV8IBwi6YVqTWFXhyHX3ZGMEu7 G6sgeDF3xyR6s5sMCt8eN98W/EbSOPfA3Ur5CIVxBNHy0WdpNnaaYzMPki+Yy+qL 4GmtDhOOtNfgXpNhzc534GcB2OmWecXFZ6HSLXdwSx+Uhj69rjsW4+N5AnteZuyq JLePozjsQ20GTqDGMGF2MPWzGtz1Z+rrV2keSMWWnlTMTotc+9Tti5PW9e7wVXfX HPdg2+JepW6IjHdUQ01zUNcUUcsRblHV1PSVZWqZ5yOyhCx7aKRAKoQgA+bts0xw jizRsntBo0YdotPq9bTTacC0abld1U6BVpc= Extension name: u6t0q306re ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/0931195B664ADB5B

http://decryptor.top/0931195B664ADB5B

Targets

    • Target

      e2708d3c57b562b01da42f9e7549781f_JaffaCakes118

    • Size

      165KB

    • MD5

      e2708d3c57b562b01da42f9e7549781f

    • SHA1

      3d82951dbfab5629187b26ecb7388b7a05597f67

    • SHA256

      d976a41f366fb1e3a0a5d15878d84e24704949973d9e0ccead9a779dee03ef0f

    • SHA512

      c483968f981e64021025bf4f42424df3cfb88a55bd4cb7f2aa904515eccb85e239c3d44812b28d5b617b6b8476dcc3f4258465a211ae6e6725adbf1850234619

    • SSDEEP

      3072:eCEq0R0nZ5ys5n4Y9doh7O79siUs/NaxohzDKMlt:lw02sJPi7O93N3FHlt

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks