General

  • Target

    NyttWinRARarchive.rar

  • Size

    3.4MB

  • Sample

    241120-mbq1mswcnk

  • MD5

    744cc4b75cfe42285183a9ee33f63d9c

  • SHA1

    b7be8ebc31509711b39526934a62860e04f35775

  • SHA256

    3ea702511247744377d079fb03dedb87411977028c82b0a9bbe699a80d9c895a

  • SHA512

    e22aa544b02b9807896bd25423f773dcc0b5ecf9b413a1b35a4842eb34f98c0a95dbab64832d247027516a0fc6b4dca4d566464c5ebf0d2017c0ae86155d47f7

  • SSDEEP

    98304:5FyzZFBks3UFSuof/iXuNNeDiiPW2jbU/7:ryl3k0USuof/ieLie2U/7

Malware Config

Extracted

Family

sodinokibi

Botnet

39

Campaign

1332

Decoy

wyreforest.net

clemenfoto.dk

centuryvisionglobal.com

ruggestar.ch

furland.ru

rechtenplicht.be

innovationgames-brabant.nl

acumenconsultingcompany.com

pedmanson.com

stressreliefadvice.com

lsngroupe.com

sshomme.com

tetameble.pl

optigas.com

skidpiping.de

hekecrm.com

corporacionrr.com

albcleaner.fr

ddmgen.com

katherinealy.com

Attributes
  • net

    true

  • pid

    39

  • prc

    sql

    dbsnmp

    mydesktopqos

    ocautoupds

    firefox

    msaccess

    sqbcoreservice

    synctime

    tbirdconfig

    xfssvccon

    infopath

    powerpnt

    excel

    visio

    encsvc

    ocssd

    onenote

    isqlplussvc

    mspub

    wordpa

    agntsvc

    steam

    thunderbird

    thebat

    ocomm

    winword

    oracle

    outlook

    dbeng50

    mydesktopservice

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} Extension name: {EXT} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    1332

  • svc

    svc$

    sql

    veeam

    sophos

    memtas

    mepocs

    backup

    vss

Extracted

Path

C:\Users\8elklm5045-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension 8elklm5045. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/3A594AD85B7E99DF 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/3A594AD85B7E99DF Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: UKWuDUurkt0NjCwmsZ/UN0s8m4avs3Oc1t4+Fpt1rQWjcq9ScM8Rf8jElV8kcCXz gTaQSUID7McOQjyrSNq2AfItSi5aOMfIDjh58S7dU9SJKv5off+/vMMU4I286h7D 4qtfLp0h7E8gpuOGhjuBGaDI4rUmGdQF+NlwDFKZWfxiBhYbRTp2NMxZHPn8Ab5g +8k9W9nzG5X2vbnkaXm25woMbpCjiE/Iu7CSBb+2RlFyjTFrAu/M2Nm5nxYQOhn2 QnvCGX5GK/1cTGbgigbYOTlUw4gFyJC8Uk4RxXL3MyA6et861M3sjZB9PIZ7qisE R5ht7TYedXQlfP7BD3y/ut8Y/mECxKFdW4iH/PdlUCTh7Bej6+jYJtSE4I1qtnQc UDgNvroglvN1L4hq9im0JEJurXu1eyi9GOBD98fXmNPHb3OFBP/C2atkJKI7nrJW fT0WPSwqSJlPu4Uhwz/9AJK9YjTiaE0sIsibhU2DzjhNbSWcELxXi408mqiOuVIb d6LmD/+8p7WUfLM3fiKEd0hrYsgfQAtm+yiqM9Bnb8jo+6+PtWCs28r8KautLOzA vhN0hj7twa6H3wquhtltvweDEyfWkj57QGQ3uBUm50r35DPpGihek/5oC+UE2cJZ 2blr4M+vmjrD4SXB1BnEb1cetpR6kESygi7MbJRGHkqK+LukghgqeoVSmxGUnO4z slpgmUumFHrGLW2weQScwU7Za0eYKuKH6LASJ5jBokgSSrPOVyri3+sNK7rjZODQ wfMH3YqZBi3zl6+SWkHAOXIxvvnKPfqd/izP7Zdl9n9nlwK5Gwmt13NHaFOC54dI QC+cy/vsq6w1dhntpZRWNL8+/e2FzuXr0hbHnl0ECQBKmGuTOZOEk/3VJQoB61bV aq97QaYoWHoE0mJo8BEaS0YX4zmOlxC2LvoFssixYU1WCN4SGYcp4sYUyY40EC1h 6i+6C8B9RgffJo5FBZ7+X2Zs7h0ub6seokysF2AxaZ/L1myBheFiMn3A7GT4vsx+ sjhkXrbE2+E4y9PBgQshdaRzG81r58TU0Rr9ucLABZAgCv7AKRqv/diMqayT16yH MI5G0re8ryK5uVbApibPQys0h1mPj68w224MYsrUVbhdQBg3YGvbLZpf+9O47wv1 5M5GBIyyC3H4iJcHait5sYWLhDy46+0coQ2GQDKLdiuKwmyOLKGTuYye9NOzlDmY xMjO7YMsj4iLtzG7V53B+luVWm5n1wIga+A= Extension name: 8elklm5045 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/3A594AD85B7E99DF

http://decryptor.top/3A594AD85B7E99DF

Extracted

Path

C:\Users\Admin\Documents\@[email protected]

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions, we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn Next, please find an application file named "@[email protected]". It is the decrypt software. Run and follow the instructions! (You may need to disable your antivirus for a while.) Q: How can I trust? A: Don't worry about decryption. We will decrypt your files surely because nobody will trust us if we cheat users. * If you need our assistance, send a message by clicking <Contact Us> on the decryptor window. �
Wallets

115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn

Targets

    • Target

      solara/run to start solara.bat

    • Size

      34B

    • MD5

      bfe118783da9a4345f1fbc98dfc685a0

    • SHA1

      569fc8c34b23e123f6dc981d21649ea9990d9897

    • SHA256

      d2872e7391c3ae2f491d0572df127b1b0a758ea083df053cd200b620fa29228d

    • SHA512

      44fafd5f7e04dc330490fee24ac1c95902a47e8073805e136ae6cd2bedf489580868be35e66231a31f5ca360b929bc32b74757784a394333aed682208657474b

    Score
    3/10
    • Target

      solara/run.bat

    • Size

      30B

    • MD5

      686c29811daada9c939d623efb1bb018

    • SHA1

      cb7856ef0b4811e15c50d864219b008f8a6587ca

    • SHA256

      d485c7f27a245b45218bb966ba175dbbbd809590b90dc4feb1c4fdd298ad33e5

    • SHA512

      14655cbc551857c659c5da600c5ff6f7b988aa4fbc4da04a9d6481cc139e3751473f61995f1ded7f44c8c7297c6d6a7fa0aeb69b55f7963990fe663889ef5500

    Score
    1/10
    • Target

      solara/solara

    • Size

      164KB

    • MD5

      6e3efb83299d800edf1624ecbc0665e7

    • SHA1

      0bd22f204c5373f1a22d9a02c59f69f354a2cc0d

    • SHA256

      2ca64feaaf5ab6cf96677fbc2bc0e1995b3bc93472d7af884139aa757240e3f6

    • SHA512

      dd1675bb15eb8ea2933b25413271117823ad7ff38280e7f552b5201e3a5bef8607a2112df2e24f598449ebfdb570ff9458aba0314ed8819dd4d774ea855e9ad2

    • SSDEEP

      3072:FWeI5JXJRGpUhFiWjmfb+HP+rnRfU9ECs5p:FWe29/GuzjmfCHWtUiCs5p

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Sodinokibi family

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Target

      solara/solara fix.exe

    • Size

      3.4MB

    • MD5

      84c82835a5d21bbcf75a61706d8ab549

    • SHA1

      5ff465afaabcbf0150d1a3ab2c2e74f3a4426467

    • SHA256

      ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa

    • SHA512

      90723a50c20ba3643d625595fd6be8dcf88d70ff7f4b4719a88f055d5b3149a4231018ea30d375171507a147e59f73478c0c27948590794554d031e7d54b7244

    • SSDEEP

      98304:QqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2g3x:QqPe1Cxcxk3ZAEUadzR8yc4gB

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Wannacry family

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • File and Directory Permissions Modification: Windows File and Directory Permissions Modification

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks