General

  • Target

    1afb4979e4e6ff85fac9509f13d002adfce88da1a8cc716201996b616d8e9561

  • Size

    274KB

  • MD5

    f6e66fd7f84923e880ae8b9ff186c82a

  • SHA1

    f553513fde4fb0a3c4c1ead2437e74a5ebe3c1f5

  • SHA256

    1afb4979e4e6ff85fac9509f13d002adfce88da1a8cc716201996b616d8e9561

  • SHA512

    ddad53423b4cf6ab3b1c5b5e9b275d89bd56a284e2ebafab8cd1c4b0e1c15ec8b77cf136f368cd6089958d7f1cc88f08e59ff7daf63e7238fb9de3450e7898c9

  • SSDEEP

    6144:ow9vteqJggn7oUfFcLWeGbfUTpYDDmu/+3fbc:oitgi7oUfavG+pG/Yc

Malware Config

Extracted

Family

sodinokibi

Botnet

$2a$10$rsIIyY2dx6y5j3gb1T189ee0VFXB.0ImN/bN2vbUcjxBTG7Q6ZNTy

Campaign

3810

Decoy

ki-lowroermond.nl

facettenreich27.de

tips.technology

sporthamper.com

ontrailsandboulevards.com

kidbucketlist.com.au

vesinhnha.com.vn

you-bysia.com.au

zimmerei-fl.de

blacksirius.de

sportsmassoren.com

lorenacarnero.com

citymax-cr.com

braffinjurylawfirm.com

caribbeansunpoker.com

atmos-show.com

webmaster-peloton.com

liveottelut.com

tanzschule-kieber.de

nancy-informatique.fr

Attributes
  • net

    false

  • pid

    $2a$10$rsIIyY2dx6y5j3gb1T189ee0VFXB.0ImN/bN2vbUcjxBTG7Q6ZNTy

  • prc

    powerpnt

    synctime

    wordpad

    firefox

    encsvc

    msaccess

    agntsvc

    xfssvccon

    ocssd

    mydesktopqos

    oracle

    visio

    sqbcoreservice

    winword

    infopath

    ocautoupds

    dbeng50

    thebat

    isqlplussvc

    dbsnmp

    thunderbird

    tbirdconfig

    mydesktopservice

    ocomm

    sql

    outlook

    excel

    onenote

    steam

    mspub

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    3810

  • svc

    sophos

    backup

    sql

    veeam

    memtas

    svc$

    vss

    mepocs

Signatures

  • Sodinokibi family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1afb4979e4e6ff85fac9509f13d002adfce88da1a8cc716201996b616d8e9561
    .dll windows:5 windows x86 arch:x86

    3405adb708f38a8c5b5ee1fd45dead95


    Headers

    Imports

    Sections