When Sodin (also known as Sodinokibi and REvil) appeared in the first half of 2019, it immediately caught attention for distributing itself through an Oracle Weblogic vulnerability and carrying out attacks on MSP providers. It also exploits the CVE-2018-8453 vulnerability to elevate privileges in Windows (rare among ransomware), and uses legitimate processor functions to circumvent security solutions.
To escalate privileges, Trojan-Ransom.Win32.Sodin uses a vulnerability in win32k.sys; attempts to exploit the vulnerability was assigned the number CVE-2018-8453. After the exploit is executed, the Trojan acquires the highest level of privileges.
Indicators of Compromise
Malware Hash (MD5/SHA1/SH256)
It is advised to ensure that all software are regularly updated to the most recent versions.