General

  • Target

    NyttWinRARarchive.rar

  • Size

    3.4MB

  • Sample

    241120-mfgmrswcrr

  • MD5

    2696e54a302904ee5eab8d0a08f6f03e

  • SHA1

    97d90947f77d84d50c197881ea622942ceadf6f7

  • SHA256

    035fdade08c77250a80b6f9c7bb3dc699c7da60db14fb012388b55f27fc298ac

  • SHA512

    cbb13136e81128f993064570bad1db39a374d35f17a7244160e342a4b0cbc0e60486923665cb62f4cf82ace8dcbfb8109c057a7bc3e2c4c0a046e601169c1527

  • SSDEEP

    98304:i0yzZFBks3UFSuof/iXuNNeDiiPW2jbU/K:Vyl3k0USuof/ieLie2U/K

Malware Config

Extracted

Family

sodinokibi

Botnet

39

Campaign

1332

Decoy

wyreforest.net

clemenfoto.dk

centuryvisionglobal.com

ruggestar.ch

furland.ru

rechtenplicht.be

innovationgames-brabant.nl

acumenconsultingcompany.com

pedmanson.com

stressreliefadvice.com

lsngroupe.com

sshomme.com

tetameble.pl

optigas.com

skidpiping.de

hekecrm.com

corporacionrr.com

albcleaner.fr

ddmgen.com

katherinealy.com

Attributes
  • net

    true

  • pid

    39

  • prc

    sql

    dbsnmp

    mydesktopqos

    ocautoupds

    firefox

    msaccess

    sqbcoreservice

    synctime

    tbirdconfig

    xfssvccon

    infopath

    powerpnt

    excel

    visio

    encsvc

    ocssd

    onenote

    isqlplussvc

    mspub

    wordpa

    agntsvc

    steam

    thunderbird

    thebat

    ocomm

    winword

    oracle

    outlook

    dbeng50

    mydesktopservice

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} Extension name: {EXT} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    1332

  • svc

    svc$

    sql

    veeam

    sophos

    memtas

    mepocs

    backup

    vss

Extracted

Path

C:\Program Files (x86)\ryg6t1-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension ryg6t1. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/20B78BB47602048C 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/20B78BB47602048C Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: qEapZKb1MEANujDTaDlKe10qxyfoJQVjhCD7zFalaBwibs2EDDtmF+MEddO/3FOQ dkagkiHSQByAGIVILrm4ay0fQlRSk94AWZoFRjcBcgQTeOVw0IB+x4kna0JSJy3J jYDR3Ru5vEBQLzS0bpBr7MgMDeY1Jq7O1i0gX+nMPbNkXxYvmbU+ix4oEfWMcDrF QtDYNwPH/nzkhvcThWCm39yeRPQ/lyB/4Er0mJfpK5X00t/NKaTqGXBcAoTL7/nk FhMuibJkKjuoPxb8naY517Cm3sqEyO8D8PkRloqEAe/enIGN3BU0YWOSj7GlE3jB 9g4bZg4mJSNBLXofvJXp6JFVsEl7tR4gX5QVBX8ygJ69e6Y3QJi/KfuRAH30Lmnm iRSdlhkHlxj0+buQo4lN+2eyB0PdAQ13Pflo/PbYtA9qqp5YIJG5QW/8OJr/g+i0 Mbo+t1OGFAjgTEl20SQHuc3NPUY+mXtIBp3xVAsKtUgZxs4XpEsI1e5yYtPHhv87 TaAa+8qI4ESPPlfgtccpClkMAr4szceifw89iSW9bzzEslJhvelGUaME3Cyg+tpu vuovZ0rQBVkqXV8ohLarYrScLHEfvpxEi2lRou+S/eSVAtOTBzG4T+4eUE91/+jI 4tBnJW4upTj8sXQZ2pbCBvhxl3efySGDGGJHATwyJi6uyCBFlOx8+20S74ImYx5F ev4dGWlpPJWWJqJ/NAhWlMFf5dt7EiHJhuoTn625ia4X7WzyujOg5+BTSmaD9gAE dakuh+OCSHZ6neBmFSEUxovMWK0iK4fhA20SjUbmhNJlMJ5v0P6mKgrDnL3SVoA5 4awUDLoNABEgckt55SE5r4CU8p7eJqMLNVebnqzgg0oJEshxLJZILMwZPKxhDaVp hhaaJvSoUikQrZuPRORJK7rVujpbVLXgEObAA7Odii8lCOwG3aAx8Kl/vBKA94xv gMOh8RtBkUwDUNMxY5kIF+A5wfG5TLmdd3OEmTu6qaweGkR5YOjDmqOPo9tdNHDN 9AySSWKqTquVFMkP523t5Rwk0PqkexHVz/96UKGTXxFCqHLUWKiUyRib1A2VrtN2 ZuEaiEvvWt+A2fxmUoqpndWcEP3ehxT/hFyVgP9cpJGhhQJ6Yj6+NUdazja5YxS8 dBLMYfAmzm5pGeYIUsGoKEsyWUociX5vpWpUgm0A0kFrEMvNB6B4tE8a6qM8RGv0 HHYP/aZ+dvhMlQ7C0d1nece/ Extension name: ryg6t1 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/20B78BB47602048C

http://decryptor.top/20B78BB47602048C

Extracted

Path

C:\Users\Admin\Documents\@[email protected]

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions, we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94 Next, please find an application file named "@[email protected]". It is the decrypt software. Run and follow the instructions! (You may need to disable your antivirus for a while.) Q: How can I trust? A: Don't worry about decryption. We will decrypt your files surely because nobody will trust us if we cheat users. * If you need our assistance, send a message by clicking <Contact Us> on the decryptor window. �
Wallets

13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94

Targets

    • Target

      solara/run to start solara.bat

    • Size

      161B

    • MD5

      5ba29b6351092906e045ab918e95a45d

    • SHA1

      e609ed3240b7b35b082d52543e067e006b8292ec

    • SHA256

      bd8a70cd89e87e2cc1b6d2e93e9645003eaba05a04fd2311866f342e6140c418

    • SHA512

      5b1032f22ca9a6386f1fa16540a2bcb37c7c6d69479a640a96ccf64541f8b87828eab4fe021fc56b0eaf1cfc7f9fabcfa143d5885992387181908523b27cc9d8

    Score
    1/10
    • Target

      solara/solara

    • Size

      164KB

    • MD5

      6e3efb83299d800edf1624ecbc0665e7

    • SHA1

      0bd22f204c5373f1a22d9a02c59f69f354a2cc0d

    • SHA256

      2ca64feaaf5ab6cf96677fbc2bc0e1995b3bc93472d7af884139aa757240e3f6

    • SHA512

      dd1675bb15eb8ea2933b25413271117823ad7ff38280e7f552b5201e3a5bef8607a2112df2e24f598449ebfdb570ff9458aba0314ed8819dd4d774ea855e9ad2

    • SSDEEP

      3072:FWeI5JXJRGpUhFiWjmfb+HP+rnRfU9ECs5p:FWe29/GuzjmfCHWtUiCs5p

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Sodinokibi family

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Target

      solara/solarafix.exe

    • Size

      3.4MB

    • MD5

      84c82835a5d21bbcf75a61706d8ab549

    • SHA1

      5ff465afaabcbf0150d1a3ab2c2e74f3a4426467

    • SHA256

      ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa

    • SHA512

      90723a50c20ba3643d625595fd6be8dcf88d70ff7f4b4719a88f055d5b3149a4231018ea30d375171507a147e59f73478c0c27948590794554d031e7d54b7244

    • SSDEEP

      98304:QqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2g3x:QqPe1Cxcxk3ZAEUadzR8yc4gB

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Wannacry family

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • File and Directory Permissions Modification: Windows File and Directory Permissions Modification

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks