General
-
Target
JaffaCakes118_22ced8b16c6dc02cb7556a95112a3cd070983f455688039e0a65a88d1053d319
-
Size
787KB
-
Sample
241226-yljj4axkdy
-
MD5
b3193c102b6c328b8fea5889da929d5a
-
SHA1
ff87d1921436f849a95d9b0d9f7956e82e400882
-
SHA256
22ced8b16c6dc02cb7556a95112a3cd070983f455688039e0a65a88d1053d319
-
SHA512
1471931bec9a8ff2c0fb1b15841af639519e99e33d59bad7eb46edd57ed05204371329e448185b81824e473dd3358862e8626176b69f7ae32251c61dffd25592
-
SSDEEP
24576:lXRd5ZZ0WeqLkzjF+4LZ0WelLkzjF+4MLkzjF+4jZ9:JRd5ZZ0WeqLkzjF5Z0WelLkzjFCLkzjn
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_22ced8b16c6dc02cb7556a95112a3cd070983f455688039e0a65a88d1053d319.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_22ced8b16c6dc02cb7556a95112a3cd070983f455688039e0a65a88d1053d319.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Default\0uvcq6984-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/91E500EC13E99128
http://decryptor.top/91E500EC13E99128
Targets
-
-
Target
JaffaCakes118_22ced8b16c6dc02cb7556a95112a3cd070983f455688039e0a65a88d1053d319
-
Size
787KB
-
MD5
b3193c102b6c328b8fea5889da929d5a
-
SHA1
ff87d1921436f849a95d9b0d9f7956e82e400882
-
SHA256
22ced8b16c6dc02cb7556a95112a3cd070983f455688039e0a65a88d1053d319
-
SHA512
1471931bec9a8ff2c0fb1b15841af639519e99e33d59bad7eb46edd57ed05204371329e448185b81824e473dd3358862e8626176b69f7ae32251c61dffd25592
-
SSDEEP
24576:lXRd5ZZ0WeqLkzjF+4LZ0WelLkzjF+4MLkzjF+4jZ9:JRd5ZZ0WeqLkzjF5Z0WelLkzjFCLkzjn
Score10/10-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Sodinokibi family
-
Renames multiple (149) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1