Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are impacting your business

Ransom Notes:

IOC

---=== Welcome. Again. ===---

We strongly encourage You to pay your attention to this message and read it to the end.

All Your files are encrypted, and currently unavailable, now all files on your system has extension {EXT} 
Before that, all of your most important personal and business
 files were backed up to our secure offline storage. 
We took them for temporary storage - but we don't need your 
files and we are not personally interested in your business.

Our encryption algorithm is the most technically difficult and max resistant to burglary. 
Only OUR specialists can decrypted your files without loss(!) 
Any attempts to decrypt files on your own lead to damage them beyond repair(!)

Best way to you will be consent to negotiations and mutual agreement between us. 
To connect us you need to download TOR browser and follow the link to begin 
negotiations.(You can find full instructions below.) 
We are waiting You and ready to listen all 
your offers and discuss them.

If You will ignore this letter - we will have to sell 
closed auction all yours private files, photoes, business correspondence, 
documents and business files + with our analysis of your work 
activity (weakness of your business, financial violations and the opportunity 
to profit from this information). It will offset our financial losses.

Or we'll just put all your files in the public domain, where everyone can download 
and use them as they wish. 
* For TOR Browser 
http://dnpscnbaix6nkwvystl3yxglz7nteicqrou3t75tpcc5532cztc46qyd.onion/

We are known as "Sodinokibi (REvil) Ransomware". For example, this article:
https://www.coveware.com/blog/2019/7/15/ransomware-amounts-rise-3x-in-q2-as-ryuk-amp-sodinokibi-spread
You have a guarantee that your files will be returned 100 %.
And remember, this is only business, nothing personal..
We have a concept of business honor, and we can promise something if we come to a mutual agreement:
1. We guarantee to decrypt all your files in the shortest possible time
2. We will delete all your files and forget about your company.
3. We will show your weaknesses in your networks.


.-= INSTRUCTIONS TO CONNECT =-.

How to get access on website?

You have two ways:

1) [Recommended] Using a TOR browser!
  a) Download and install TOR browser from this site: https://torproject.org/
  b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID}

2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this:
  a) Open your any browser (Chrome, Firefox, Opera, IE, Edge)
  b) Open our secondary website: http://decoder.re/{UID}

Warning: secondary website can be blocked, thats why first variant much better and more available.
When you open our website, put the following data in the input form:
Key:


[snip]



----------------------------------------------------------------------------------
!!! DANGER !!!
DONT try to change files by yourself, 
DONT use any third party software for restoring your data or antivirus solutions - 
its may entail damge of the private key and, as result, The Loss all your data!

Indicators of Compromise
Type IOC
onion url http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID}
onion url http://dnpscnbaix6nkwvystl3yxglz7nteicqrou3t75tpcc5532cztc46qyd.onion/