General

  • Target

    4ae110bb89ddcc45bb2c4e980794195ee5eb85b5261799caedef7334f0f57cc4

  • Size

    678KB

  • Sample

    210329-bjc4pk8dxj

  • MD5

    82143033173cbeee7f559002fb8ab8c5

  • SHA1

    e03aedb8b9770f899a29f1939636db43825e95cf

  • SHA256

    4ae110bb89ddcc45bb2c4e980794195ee5eb85b5261799caedef7334f0f57cc4

  • SHA512

    77377c732c3fb944f56170e6382fbc25e8bbe1f2ffd42290c52da5f33f7301272c67356843464c89bba71b8c45e3d4222fe70bb7a1f80bbe89b3ce2dc498dcf1

Malware Config

Targets

    • Target

      4ae110bb89ddcc45bb2c4e980794195ee5eb85b5261799caedef7334f0f57cc4

    • Size

      678KB

    • MD5

      82143033173cbeee7f559002fb8ab8c5

    • SHA1

      e03aedb8b9770f899a29f1939636db43825e95cf

    • SHA256

      4ae110bb89ddcc45bb2c4e980794195ee5eb85b5261799caedef7334f0f57cc4

    • SHA512

      77377c732c3fb944f56170e6382fbc25e8bbe1f2ffd42290c52da5f33f7301272c67356843464c89bba71b8c45e3d4222fe70bb7a1f80bbe89b3ce2dc498dcf1

    • MedusaLocker

      Ransomware with several variants first seen in September 2019.

    • MedusaLocker Payload

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks