PULSE NAME
Sodin ransomware exploits Windows vulnerability and processor architecture
WHITE AlienVault 2019-07-03 Modified: 2019-07-15
3
IOCs
LOW VOLUME
When Sodin (also known as Sodinokibi and REvil) appeared in the first half of 2019, it immediately caught our attention for distributing itself through an Oracle Weblogic vulnerability and carrying out attacks on MSP providers. In a detailed analysis, we discovered that it also exploits the CVE-2018-8453 vulnerability to elevate privileges in Windows (rare among ransomware), and uses legitimate processor functions to circumvent security solutions.
Indicators of Compromise (3)
All FileHash-MD5 URL
TYPEINDICATORDESCRIPTIONCREATED
FileHash-MD5 1ce1ca85bff4517a1ef7e8f9a7c22b16 2019-07-03
URL https://pastebin.com/raw/yJnNFtb9 2019-07-15
FileHash-MD5 4b0f2fd2a8632f7b85607f7bb85de86f 2019-07-15