MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 591d971b9411860904bc7fb9234d9069e3e8cacd06523b0bf93547bc2c4a827a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Sodinokibi


Vendor detections: 10


Intelligence 10 IOCs YARA 1 File information Comments

SHA256 hash: 591d971b9411860904bc7fb9234d9069e3e8cacd06523b0bf93547bc2c4a827a
SHA3-384 hash: d8a160bdb5d5126881267311152a6462343cfa1c140cf4cbba7c163ab56334cce8674882c95c3c4dbc6270618ee78332
SHA1 hash: b837df01d31c1bfff0e54f07076323d075a4bf27
MD5 hash: 35766bd0b389c682306437d45ba5c4e6
humanhash: seven-utah-item-oven
File name:591d971b9411860904bc7fb9234d9069e3e8cacd06523b0bf93547bc2c4a827a.bin.exe
Download: download sample
Signature Sodinokibi
File size:118'272 bytes
First seen:2020-08-20 13:02:29 UTC
Last seen:2020-08-20 20:15:46 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash c686e5b9f7a178eb79f1cf16460b6a18 (3 x Sodinokibi)
ssdeep 1536:/DMcoFQf0U4u//dpkDM5Rw8IP3NHpwOqJICS4A9O/g7u4VFaIxf:euDkD+I3NJFqD4hf
Threatray 168 similar samples on MalwareBazaar
TLSH D1C3C062E96102F3D99302F6232B7F1B98FFFE74251958F6D36089480E75483EA1B527
Reporter Dashowl
Tags:Sodinokibi

Intelligence


File Origin
# of uploads :
2
# of downloads :
852
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Sending a UDP request
Using the Windows Management Instrumentation requests
Modifying a system file
Creating a file in the Windows subdirectories
Launching a service
Creating a file
Creating a file in the Program Files directory
Creating a file in the Program Files subdirectories
Changing a file
Reading critical registry keys
Blocking Windows Firewall launch
Stealing user critical data
Creating a file in the mass storage device
Encrypting user's files
Result
Threat name:
Sodinokibi
Detection:
malicious
Classification:
rans.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Contains functionality to detect sleep reduction / modifications
Contains functionalty to change the wallpaper
Encrypted powershell cmdline option found
Found malware configuration
Found ransom note / readme
Found Tor onion address
Machine Learning detection for sample
Modifies existing user documents (likely ransomware behavior)
Multi AV Scanner detection for submitted file
Sigma detected: Delete Shadow Copy Via Powershell
Yara detected Sodinokibi Ransomware
Behaviour
Behavior Graph:
Threat name:
Win32.Ransomware.Sodinokibi
Status:
Malicious
First seen:
2020-08-10 17:45:11 UTC
AV detection:
23 of 25 (92.00%)
Threat level:
  5/5
Result
Malware family:
sodinokibi
Score:
  10/10
Tags:
ransomware family:sodinokibi persistence
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Drops file in Program Files directory
Drops file in System32 directory
Modifies service
Sets desktop wallpaper using registry
Enumerates connected drives
Modifies extensions of user files
Sodin,Sodinokibi,REvil
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:win_revil_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments