General

  • Target

    Ny(tt) WinRAR archive.rar

  • Size

    3.4MB

  • Sample

    241120-mbwwwszmhl

  • MD5

    2696e54a302904ee5eab8d0a08f6f03e

  • SHA1

    97d90947f77d84d50c197881ea622942ceadf6f7

  • SHA256

    035fdade08c77250a80b6f9c7bb3dc699c7da60db14fb012388b55f27fc298ac

  • SHA512

    cbb13136e81128f993064570bad1db39a374d35f17a7244160e342a4b0cbc0e60486923665cb62f4cf82ace8dcbfb8109c057a7bc3e2c4c0a046e601169c1527

  • SSDEEP

    98304:i0yzZFBks3UFSuof/iXuNNeDiiPW2jbU/K:Vyl3k0USuof/ieLie2U/K

Malware Config

Extracted

Family

sodinokibi

Botnet

39

Campaign

1332

Decoy

wyreforest.net

clemenfoto.dk

centuryvisionglobal.com

ruggestar.ch

furland.ru

rechtenplicht.be

innovationgames-brabant.nl

acumenconsultingcompany.com

pedmanson.com

stressreliefadvice.com

lsngroupe.com

sshomme.com

tetameble.pl

optigas.com

skidpiping.de

hekecrm.com

corporacionrr.com

albcleaner.fr

ddmgen.com

katherinealy.com

Attributes
  • net

    true

  • pid

    39

  • prc

    sql

    dbsnmp

    mydesktopqos

    ocautoupds

    firefox

    msaccess

    sqbcoreservice

    synctime

    tbirdconfig

    xfssvccon

    infopath

    powerpnt

    excel

    visio

    encsvc

    ocssd

    onenote

    isqlplussvc

    mspub

    wordpa

    agntsvc

    steam

    thunderbird

    thebat

    ocomm

    winword

    oracle

    outlook

    dbeng50

    mydesktopservice

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} Extension name: {EXT} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    1332

  • svc

    svc$

    sql

    veeam

    sophos

    memtas

    mepocs

    backup

    vss

Extracted

Path

C:\Users\Admin\Desktop\solara\@[email protected]

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions, we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94 Next, please find an application file named "@[email protected]". It is the decrypt software. Run and follow the instructions! (You may need to disable your antivirus for a while.) Q: How can I trust? A: Don't worry about decryption. We will decrypt your files surely because nobody will trust us if we cheat users. * If you need our assistance, send a message by clicking <Contact Us> on the decryptor window. �
Wallets

13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94

Targets

    • Target

      Ny(tt) WinRAR archive.rar

    • Size

      3.4MB

    • MD5

      2696e54a302904ee5eab8d0a08f6f03e

    • SHA1

      97d90947f77d84d50c197881ea622942ceadf6f7

    • SHA256

      035fdade08c77250a80b6f9c7bb3dc699c7da60db14fb012388b55f27fc298ac

    • SHA512

      cbb13136e81128f993064570bad1db39a374d35f17a7244160e342a4b0cbc0e60486923665cb62f4cf82ace8dcbfb8109c057a7bc3e2c4c0a046e601169c1527

    • SSDEEP

      98304:i0yzZFBks3UFSuof/iXuNNeDiiPW2jbU/K:Vyl3k0USuof/ieLie2U/K

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Sodinokibi family

    • Sodinokibi/Revil sample

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Wannacry family

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • File and Directory Permissions Modification: Windows File and Directory Permissions Modification

    • Sets desktop wallpaper using registry

    • Target

      solara/run to start solara.bat

    • Size

      161B

    • MD5

      5ba29b6351092906e045ab918e95a45d

    • SHA1

      e609ed3240b7b35b082d52543e067e006b8292ec

    • SHA256

      bd8a70cd89e87e2cc1b6d2e93e9645003eaba05a04fd2311866f342e6140c418

    • SHA512

      5b1032f22ca9a6386f1fa16540a2bcb37c7c6d69479a640a96ccf64541f8b87828eab4fe021fc56b0eaf1cfc7f9fabcfa143d5885992387181908523b27cc9d8

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks