General

  • Target

    4552132719181824.zip

  • Size

    300KB

  • Sample

    211129-jqaqesegg4

  • MD5

    cb9b02262dd099c2be852f80b612d9df

  • SHA1

    7023a0b5d68d80b1bae3cf17745b6d3a1a830bbb

  • SHA256

    45c46ce6e6c549d90e06f1ab9722e01a075153dd6b667c0e716d37bf10fe05ea

  • SHA512

    33c53c1b81645043e6d54ccc92569fa2b7585228bcda13432b599bbaf74879d141cee50a6cef31317918ff669cd220d5831e57fe60e3b9bc2508eef012efad7f

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\HOW_TO_RECOVER_DATA.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">0D08F365613CDA2B8F26107E2898494D35843956EABFF152F28719B3FDD3E01E7F8F31979BCD58130BC514640DB859AE73EA1A2FD2A00A690AD7B97272D17A8C<br>1A9939F96BF88B4FC0DC72F2F3E8D05682EA853E0DC471D7971BB946B3A76F892093C4110620E8292A336E678A6FD9BC45C36D4F0209DBE3E42E85533847<br>63D9CA5A1A262120246A5953D6A87865FADFDADCD16244D1DABB80FE7B83205C859A32654839BC950E9E3B4C8772C91D57C16E402945DDA4D98B0D8E900A<br>0A29C8E0B1686D989646CC929651F90C473254A08C1068382719D79952152FAB34FCBF6494302469B9E573B4CA62DE5BEFDDA50F7E5126C1F58D41D0D5F4<br>08FCA0CDD8A5129D518DB4FF101B725B22107CF4D01375F0B9C846152576238C5528CF2129F3B212817FABC608DE2A9C9D152623E43A9D7CC34E9477B55B<br>669887A1437EDB7D8CBC153FD87DCA879081C95ECC07172401C548345A609073DE3141284C76710658751DFFD94AEEE9EFA520855A35901DB5AC6D6E30BA<br>9F778C2C2364B2D23EC5B2EC6BD90893E43966E6DE4BCCF9EFBE9CFDD63898937FCC6B6EC96883FEDBEFA1BE2748D5B15B6F3245F4D0C62E124A75CAB9B9<br>0BB0151078BB2E68FAD13FA40CD046F242E1D1404A28C05D0C26C16CAA46F581EC9FC851FD3E2091CAAC0FEFC6E813BA716E2784E8630C8A13CDC561E562<br>985F5C5E8DF635E125B34F5A858A</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <a>.onion</a><br> * Note that this server is available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open <a>.onion<br> </a> 4. Start a chat and follow the further instructions. <br> <hr> <b>If you can not use the above link, use the email:</b><br> <a href="[email protected] ">[email protected] </a> <br> <a href="[email protected] ">[email protected] </a> <br> <p>* To contact us, create a new free email account on the site: <a href="https://protonmail.com">protonmail.com <br> <b> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Extracted

Path

C:\Boot\HOW_TO_RECOVER_DATA.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">DF340C68DAAA34B5ADE1D3D1F80ECFA2C36B75F2A1003E134503BCBF7331069890CA91263A952C88034E15092DC0C80A962678629477A4EBF9FE926C4343FCE1<br>D40695388BF7C02F06CF8D20E5AC712C18941CC7C979EB3F22E0D92912DF57FB8007C6223210552B6A12DA21D5B48486286193A0461B4834C076F98D551D<br>786AA9661F181055B1C6BAE62DD3A01529202AAD5E6741B2D89D89151213CFE77E63B3CFD39A2F7D0213C099975F9E479E2530C34C1F06A0BACBB52FD4A7<br>19E2EA509CD6A9D0A0A1137B92D1AA85CC7F5E4C4F74588E33801F30FC675533B6289B238EA061A7475788CC4EC9D10664CA9E9B28A635F52DB98CF107A5<br>C3267A640A299B81490FB435B504098A95B424DC38CCC154648F7DAE0487E93AFE1231A912759694B1C720408181B52A14F0C0814087F5FB1864059EC4F0<br>40E221ACC6D1A17B6B3AF28523FF78959D3253AAF40C941CE076480B89D96755189EDCB2A04AD3C1AB3E6831A7CDD2A327DEF796ECEA2E6F4FFCF9645F26<br>3220E04E818986A37B848B50A32E32F9F23BC32188467B137171D20FD9CEB5CB8295B8349284EDBEC8363E30BF59703A2DEF3D402938C21E04620C1E04EE<br>9837EAF750403D986617BF4A03B60467C6BD06E0269C9508091CEE9C28604B4345A62AF5E4FADFEF2C4D6FC0158E90854445F96B153130EE912F3959DCFE<br>CE26241F6FAF25D4E9BB5926E14C</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <a>.onion</a><br> * Note that this server is available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open <a>.onion<br> </a> 4. Start a chat and follow the further instructions. <br> <hr> <b>If you can not use the above link, use the email:</b><br> <a href="[email protected] ">[email protected] </a> <br> <a href="[email protected] ">[email protected] </a> <br> <p>* To contact us, create a new free email account on the site: <a href="https://protonmail.com">protonmail.com <br> <b> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Targets

    • Target

      46c9bed88ac58193eb8c1b2ca91cfede01a74dafa4315ff57b7d3bb0c8a779cd

    • Size

      669KB

    • MD5

      f3f4909771e23ec301ae2a2c5945f25c

    • SHA1

      0cbbc30d64966d7108f3404979058285d8ed250c

    • SHA256

      46c9bed88ac58193eb8c1b2ca91cfede01a74dafa4315ff57b7d3bb0c8a779cd

    • SHA512

      fd928762c0ddc8301092504874b0ff4ad81a65c4cd385a493db2a5dcce786bcb2f915869958a6618ba10ac443ac6af6a458fed5ec2aedc52e0c649d9d72c27ad

    • MedusaLocker

      Ransomware with several variants first seen in September 2019.

    • MedusaLocker Payload

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks