General

  • Target

    revil_sodinokibi

  • Size

    164KB

  • Sample

    241120-lffvsszjgm

  • MD5

    6e3efb83299d800edf1624ecbc0665e7

  • SHA1

    0bd22f204c5373f1a22d9a02c59f69f354a2cc0d

  • SHA256

    2ca64feaaf5ab6cf96677fbc2bc0e1995b3bc93472d7af884139aa757240e3f6

  • SHA512

    dd1675bb15eb8ea2933b25413271117823ad7ff38280e7f552b5201e3a5bef8607a2112df2e24f598449ebfdb570ff9458aba0314ed8819dd4d774ea855e9ad2

  • SSDEEP

    3072:FWeI5JXJRGpUhFiWjmfb+HP+rnRfU9ECs5p:FWe29/GuzjmfCHWtUiCs5p

Malware Config

Extracted

Family

sodinokibi

Botnet

39

Campaign

1332

Decoy

wyreforest.net

clemenfoto.dk

centuryvisionglobal.com

ruggestar.ch

furland.ru

rechtenplicht.be

innovationgames-brabant.nl

acumenconsultingcompany.com

pedmanson.com

stressreliefadvice.com

lsngroupe.com

sshomme.com

tetameble.pl

optigas.com

skidpiping.de

hekecrm.com

corporacionrr.com

albcleaner.fr

ddmgen.com

katherinealy.com

Attributes
  • net

    true

  • pid

    39

  • prc

    sql

    dbsnmp

    mydesktopqos

    ocautoupds

    firefox

    msaccess

    sqbcoreservice

    synctime

    tbirdconfig

    xfssvccon

    infopath

    powerpnt

    excel

    visio

    encsvc

    ocssd

    onenote

    isqlplussvc

    mspub

    wordpa

    agntsvc

    steam

    thunderbird

    thebat

    ocomm

    winword

    oracle

    outlook

    dbeng50

    mydesktopservice

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} Extension name: {EXT} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    1332

  • svc

    svc$

    sql

    veeam

    sophos

    memtas

    mepocs

    backup

    vss

Extracted

Path

C:\Users\8u01tqu4-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension 8u01tqu4. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/9CDA86B59302E69B 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/9CDA86B59302E69B Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: Mf3s3+BJIH5YbXdxE+nQ2GBDPdeCk/VAlZ9UggZE5cbWNYlo+XIdBV89Y1zwFeEK XMyEzO+E7uxkLkpLbm52uM8Z5A85bMQ4quSje5gm1GTUR8rxQzAVR92hsg3oln0I y5SobRguIHfIceHVs/GBS9UPQioN/T/0Cci5T29Wxdnh4vKRXyObHUglg+Opw8F+ SEKix6eW3+uBczyjWcJA0cK1VY4W7gPPHewev7dF/OpeUdzgRks0k0TBgpnLFp6B gXUcrOM6HQsnauh/C2SnBylNtUwn7RDTELHOMpjB6ZR48hlevPD1nKTFLq0ztNai S2sbUiyEsVJgs+2Pb1rIneB0DHsFhv+E/HxlcQSqT30WNvJHJgyTSGqixvR4SUOn Njbu0lvAHGqDNajrlisz1FxZjzBoll8eG6FOLGfcuTkymtP4GyIAmB0gEPANao4A 8MlO4pGxvEppolhZvbf9zHfmx95pmlqB58daUIxwQkFDEkZlhVMU3hlCtM5qdz2Z 4IE+Vr77w0XBmfAfj1DSC6QIuHhlWdAuO48Sgtox+JIIX0dpYqD0CLHKsaUWEISu gkpw0ALfz5fwzsDADB06+M8uHFE5SciDSPH03RVnBeDclV5R6yyQcseVKHMS7RKH 3BifU8/qIiFooY8oyB/5zblz8I02v0edqaCIosHin4hf2lh49qO+QKf+fnl/7/+T dWS4i3hDPuTwnG6eGrVgpAram3UkvHtm/Y9X2C1qOc8FHLecac68F34WnTsJqhXm wv842GAunKsa9q9cRjBbYPFo7XG6XNN/5DC8XPJ2IkqaiTBDD8PvZBIJbXlvelx5 p5WpXDAdEDyRYddwVWmVQqz6Dzi0uuFknp/B45GGdtoIIgj0MmvCJHbee1ydzi22 8LKlHe7c6cDAwbjvtvI3b5d7N6NojL3dTeL6KVZQgFrAfdBWXHY8G9Uw0f1ajIIR eJMaLtInFL1TOFNvyVrYi9PGOEZ/8qgTcXy6lWqf8XuJ/j+usJ/XWX0a41pL69mY kRRK/5vX6IDS4yoqwozVAcfc9q41wCs7YOD7jvtnr/zXxN7KNPSsO7HO2ONnxr7M zhk6Nwl3J3kgQ9noUWYtOXM3tjUqdzsBUkrWRqQ0/EWwhA/NPVk7SjaT4SKjSdez 1yEa9Pv5WvLGXJznWq9dz6dga+LwAgSo9DG37tjCCubxYCuiqvxhKF3u5ofll1uL U0TOLSWcLJ7GF7EsCQ508y2hRc1VFd4R6EbULghHY9VY8bRRDT04ej/X Extension name: 8u01tqu4 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/9CDA86B59302E69B

http://decryptor.top/9CDA86B59302E69B

Extracted

Path

C:\Users\Admin\Downloads\@[email protected]

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions, we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw Next, please find an application file named "@[email protected]". It is the decrypt software. Run and follow the instructions! (You may need to disable your antivirus for a while.) Q: How can I trust? A: Don't worry about decryption. We will decrypt your files surely because nobody will trust us if we cheat users. * If you need our assistance, send a message by clicking <Contact Us> on the decryptor window. �
Wallets

12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw

Targets

    • Target

      revil_sodinokibi

    • Size

      164KB

    • MD5

      6e3efb83299d800edf1624ecbc0665e7

    • SHA1

      0bd22f204c5373f1a22d9a02c59f69f354a2cc0d

    • SHA256

      2ca64feaaf5ab6cf96677fbc2bc0e1995b3bc93472d7af884139aa757240e3f6

    • SHA512

      dd1675bb15eb8ea2933b25413271117823ad7ff38280e7f552b5201e3a5bef8607a2112df2e24f598449ebfdb570ff9458aba0314ed8819dd4d774ea855e9ad2

    • SSDEEP

      3072:FWeI5JXJRGpUhFiWjmfb+HP+rnRfU9ECs5p:FWe29/GuzjmfCHWtUiCs5p

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Sodinokibi family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Wannacry family

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Modifies RDP port number used by Windows

    • Sets service image path in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • File and Directory Permissions Modification: Windows File and Directory Permissions Modification

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks