General

  • Target

    c632ce1dc34111c66efb817f608bf3b547fc9df5fed478d736b4c53a41ba193e

  • Size

    669KB

  • Sample

    220201-swzfeahaf9

  • MD5

    187c968c9c7f70a8c65ebefac8e4f124

  • SHA1

    b5ec574920e42f117024e60852968da4f0584ff0

  • SHA256

    c632ce1dc34111c66efb817f608bf3b547fc9df5fed478d736b4c53a41ba193e

  • SHA512

    f4d21feb6518d2712e829f5b3e8209b76851ab7ae66e2673fef08545f085bf3ece191b37bcce14074eb2c3fc50de83339ac9bee92769a20b94886289554fa3f6

Malware Config

Targets

    • Target

      c632ce1dc34111c66efb817f608bf3b547fc9df5fed478d736b4c53a41ba193e

    • Size

      669KB

    • MD5

      187c968c9c7f70a8c65ebefac8e4f124

    • SHA1

      b5ec574920e42f117024e60852968da4f0584ff0

    • SHA256

      c632ce1dc34111c66efb817f608bf3b547fc9df5fed478d736b4c53a41ba193e

    • SHA512

      f4d21feb6518d2712e829f5b3e8209b76851ab7ae66e2673fef08545f085bf3ece191b37bcce14074eb2c3fc50de83339ac9bee92769a20b94886289554fa3f6

    • MedusaLocker

      Ransomware with several variants first seen in September 2019.

    • MedusaLocker Payload

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Executes dropped EXE

    • Sets service image path in registry

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks