General

  • Target

    2024-06-12_07887580c8d8c896575794372fea0e5b_revil_sodinokibi

  • Size

    156KB

  • Sample

    240612-lpbmfazdpb

  • MD5

    07887580c8d8c896575794372fea0e5b

  • SHA1

    e19bdafbc1925f4072c70dbe3989ccb49be18186

  • SHA256

    daac7c8703b72e04eac96278222c6325b63825416ad58d59125621f7ca936c9a

  • SHA512

    33a927cc575c6a0ee9a50c8d397ef6f09c94ed0d52e9aa41ecec303ebfcee019c17c26645f457fb54c97566c586e866c65ee1065f97766d3a0288828a40fadf7

  • SSDEEP

    1536:L1bolsa+dSn91zyKRpK63R7Pbi4eTMluxtXDCntTnICS4Ahbulmwd9jUlhQP4t4:vdo1zyKzVLbi4eTMlwDCnuuwIIn+

Malware Config

Extracted

Path

C:\Users\Default\p108g02xn-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion p108g02xn. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/E883FE1D92851F46 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/E883FE1D92851F46 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: 3FXwsVmNfoOdD9XT7PsUZ3VhUkl/GuXSo9Wkwd2i9PRDpoxyMTa1iLDugDnaueDQ aCBuD/G/IV8TyJlyEU4O3SXGvetMM3gTPFJBV23D6KLWxNLt/3m4CWmFCgBcsCU1 Z5iw1s+NGDYJbVuX9CdEOAkhVijlmZGAmNCIucT6evSH2tDMcRzbN2APf4uLiC5/ 3LZzW7UTH1nCkon5rx2lQXGbjXqByva7wGWtAlBxPSFE84maWdaRAY1ssVEZSWBJ cPbWjxt2wlG+8zK8gX5eX+jHYSL7d8KuKH5VH7OyQ4Vp9VGD59X5JJIt6sWMQp4j bPdcwTJ3/EvHt3GG6xDTQaLwjWUmRLK7vCS+Xhi5V5fWOlSeo5fP304IpFUXZAb5 wEapU8PX8kcs6wfUZGE+cg2Qj+kFoMJ10KO9kCvNNlz0/6fvcwvv8E72Uj3CpCMd Mqd2XvUSA4LgOx166lEuq7Hlrx8l7jpTIc2BWhsoRwBuaAJ5RfwKmPZXSE/NzA9/ bgYwXrK/dqwFrqbuUTx5ewOvM4OVZ+AdIOKNGGGwXb5AGP0gqVA5M3/Iuwdi+zcS VJrbh/mShvl0BUMhYzoe8DjjezeN5DjcZWcCNjR4RApZI9x+BkUXJpVCwVTzaQfm kUm31lX/lrsJo1c6bybOQbOO7obT99sTmLpLuMz8/MjVUTZngaz8nomiCbbhuBe5 CQkfxmA4hCksZN63fTOZ/3NHLDEZMlhiXpl0n509i9/3sWIFXqyN3d6/gmi1me3s ZbnTWRQCD4ale/Zuzx/uwtl2DUwXvpJt3aHjS3e6nkKd09ItzUHd4ZCeNKYZqjhA YVgfpaPpvkO+gMW0RrfrGg5xzcR6gWZI2E09PLnswHnUMW15R6ufJ7lUwKNui1yA AnfpimQw0YJv0znpauTwZZw93DSjl8D17jy+92ryeJfXfwTf4F7EyjoM/lWydn9Z m81Y5P/+iYYXDj00AeIsjZAJoDsMfrFu21f8hzzFVGp90ZgYc60xeYq1/IB0yIVr CW+Ge056YWYKvlLk+G3cyzXJixSMCHgx9Z5viqAf8dnjLjCmvhVzsAU3bOQzvrLu 23bDA4npIG6+TXklz1pKZDfiy2e4VDeJHIfebc1ndoCf61U93wTwFmSf1qYCb725 UL9DYQpXmbBv9msuQ4JhkDnkWec6lz4I0H+qaej7wjw= Extension name: p108g02xn ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/E883FE1D92851F46

http://decryptor.top/E883FE1D92851F46

Targets

    • Target

      2024-06-12_07887580c8d8c896575794372fea0e5b_revil_sodinokibi

    • Size

      156KB

    • MD5

      07887580c8d8c896575794372fea0e5b

    • SHA1

      e19bdafbc1925f4072c70dbe3989ccb49be18186

    • SHA256

      daac7c8703b72e04eac96278222c6325b63825416ad58d59125621f7ca936c9a

    • SHA512

      33a927cc575c6a0ee9a50c8d397ef6f09c94ed0d52e9aa41ecec303ebfcee019c17c26645f457fb54c97566c586e866c65ee1065f97766d3a0288828a40fadf7

    • SSDEEP

      1536:L1bolsa+dSn91zyKRpK63R7Pbi4eTMluxtXDCntTnICS4Ahbulmwd9jUlhQP4t4:vdo1zyKzVLbi4eTMlwDCnuuwIIn+

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Renames multiple (141) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Impact

Defacement

1
T1491

Tasks