• Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Alert – New Version of MegaCortex Ransomware
August 7, 2019
Rewterz Threat Alert – LokiBot Gains New Persistence Mechanism, Uses Steganography to Hide Its Tracks
August 7, 2019

Rewterz Threat Alert – Phishing Campaign Spreading SODINOKIBI Ransomware

August 7, 2019

Severity

High

Analysis Summary

The initial infection vector used by the threat actor is a phishing email containing a malicious link. When pressed, the link downloads a supposedly legitimate zip file that is actually malicious. Sodinokibi zip files have a very low detection rate on VirusTotal, which signals that the majority of antivirus vendors do not flag the initial payload as malicious. Since the initial Sodinokibi payload is able to pass undetected, the first layer of defense for many organizations is immediately bypassed.

uNIqjCAKw6Uc4QZXQnQRaEBaScxxUdor3HzqmUFET7_xgYAj8eoLwSTr33QvDEgSMtu_RgwGJRMqacl36CTUQwfST7sMIwfUeGyZNO0GfrCG3npSmkSXtpnzZDdkZkkchiJWXpsY

The zip file contains an obfuscated JavaScript file. When the user double clicks on the JavaScript file, WScript executes it.

S5hE-nFtdpijflRP1ANwsscroJGhXkTTqACx21DSUXSHRYZfyEfKzvamW866i3y5vvP3xvRy0yXdr2O_izrX8X5fbsQppRaY1UyBgAPfyywR-dbuqrq8Z9t6iTUkyI5Ozevf0u9S
y-QvCeHHHDzIjMa2vNOx0l9chSm3xN8tCK4cev4kOqbmh4BxhZJrd3DR8l4itEOCLaJXbS1_GfLK3dtAR_cDkTasT_2ELToF2eqcy_SJEU1xyp-rNbtcovpw-BT3qXdvmlHp1Par

The JavaScript file deobfuscates itself by rearranging characters from a list called eiculwo, which is located in the JavaScript file.

CJXBdeaVW0Xg5Z86qtSDkPolaGgRtrPMNt3VwRFurBbRGsi7nwUIJSkZ8EdIZoyw_To7wK5ZVoROxHJ5VMLO9NSIjzKCxECW7Bs3YwAzlQz7PgYt8c27DiyW6qU4fIDEXu9C4y8Q

The variable vhtsxspmssj, located in the JavaScript file, is an obfuscated PowerShell script that will be deobfuscated by the attackers later on in the attack.

RAdbG3kBPO14BAdffSMOyKUpgUsR_-PmaWUNou3SCCEUzLCgUP-hc13dWyxtANTxoa8gwKE54CUAuHDktro2Dogz6o1MMBj-jdRn4EnClJ_Q5j0VLGg8m-6q7xj8Yyn5UOdOT048

Impact

File encryption

Indicators of Compromise

Malware Hash (MD5/SHA1/SH256)

  • 3e974b7347d347ae31c1b11c05a667e2
  • b488bdeeaeda94a273e4746db0082841
  • e402d34e8d0f14037769294a15060508
  • b751d0d722d3c602bcc33be1d62b1ba2b0910e03
  • 5dac89d5ecc2794b3fc084416a78c965c2be0d2a
  • 2cc597d6bffda9ef6b42fed84f7a20f6f52c4756

Remediation

  • Block all threat indicators at your respective controls.
  • Always be suspicious about emails sent by unknown senders.
  • Never click on the link/attachments sent by unknown senders.
  • Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.