General

  • Target

    0f3bc144689b4ba5a96b87f8ada895b0c7a283e72aa9c533d63d6959138ca531

  • Size

    669KB

  • Sample

    220201-ta5kzahadq

  • MD5

    1a2f56aa0186b98dc77f5f493cd592b4

  • SHA1

    fbf4c6cc257bd31c9c1628e805ce85b14284713a

  • SHA256

    0f3bc144689b4ba5a96b87f8ada895b0c7a283e72aa9c533d63d6959138ca531

  • SHA512

    07ce5bf33ef1b65ff27747c11b010e918e9d3f7616f782174614ad1785c80064af7d55b78d8f81e69c2b6f40fe535823d7116919fc80368b1f0660a00103c901

Malware Config

Extracted

Path

\??\Z:\Boot\HOW_TO_RECOVER_DATA.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">A81AE199815906E68797048F932C06DBA3E11BBFDCED9988465F5DAE05B438E3AACE518837CF034E45D434C768E9CC3DA4BE6BAC964AA6C35D6BE7EB4B380243<br>C8D4C4353445E27E25C9C8FF32EA501BCEA09E321D96360F5CBEBA42C3170F67F07F97224B813C6E4C17663A9F14DEE9063885D3A8109531D8990C8D65C1<br>E2CCAB1A09C97EC3FCC5F61F6EE1DE52C444D70BF44CA13A7FEC4842AE0AD0E0AE43BCB4B23159680BF4220F35FA1EF16423732377ABCADC50EFD7ABE8B6<br>6D16E958566A843CC39887B31BA7EB7204E50456C206AD14A099969133CD0EDE57C80B5D25E2131B35EB543C2A792CC216ABCE8B5266801FD4683352F567<br>0541F0632E0132C0D47FEA0C00535DEE89240E1DE918082D40CF49B880937FF58225CB1671EFA3334A0A877361C559DBD2B0441A5558BDD38B2A1CCE58CB<br>D398AF72C41EC7B35103380B20D83FA00C1B656A614AED6A9480872D33FE49B7F0FFF7E734B5EDA928A49661A2C6713EF8BD2A2401E4AAE12EB319CD825D<br>722ABC4EDCB20784E7073738C9CDEF76C032D8458E2B375257E47D198CB643A3043D2913AEDFE030CCAB5198C9DC8AB57D3724C4C209247297DA25818D2E<br>94AC4E249AA709ED702F886A6EBEABB64C1D514BB6F98344519BD8DD7332CDFFB7D593B7EDC63C954E4EAC03F8DBA415FC6936E2CF391044397B168C5121<br>ACFAC6B2E4030609EA241629E381</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>ALL YOUR IMPORTANT FILES HAVE BEEN ENCRYPTED!</b><br><br> YOUR FILES ARE SAFE! JUST MODIFIED ONLY. (RSA+AES) <br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMENANTLY DESTROY YOUR FILE.<br> DO NOT MODIFY ENCRYPTED FILES. DO NOT RENAME ENCRYPTED FILES.<br><br> NO SOFTWARE AVAILABLE ON INTERNET CAN HELP YOU. WE ONLY HAVE<br> SOLUTION TO YOUR PROBLEM.<br><br> WE GATHERED HIGHLY CONFIDENTIAL/PERSORNAL DATA. THESE DATA<br> ARE CURRENTLY STORED ON A PRIVATE SERVER. THIS SERVER WILL BE<br> IMMEDIATELY DESTROYED AFTER YOUR PAYMENT. WE ONLY SEEK MONEY<br> AND DO NOT WANT TO DAMAGE YOUR REPUTATION. IF YOU DECIDE TO<br> NOT PAY, WE WILL RELEASE THIS DATA TO PUBLIC OR RE-SELLER.<br><br> YOU WILL CAN SEND US 2-3 NON-IMPORTANT FILES AND WE WILL<br> DECRYPT IT FOR FREE TO PROVE WE ARE ABLE TO GIVE YOUR FILES<br> BACK.<br><br> <!--text data --> <hr> <b>CONTACT US FOR PRICE (BITCOIN) AND GET DECRYPTION SOFTWARE.</b><br><br> <a href="[email protected]">[email protected]</a><br> <a href="[email protected] ? ">[email protected] </a> <hr> </div> <div class="text"> MAKE CONTACT AS SOON AS POSSIBLE. YOUR DECRYPTION KEY IS ONLY STORED <br> TEMPORARLY. IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER. </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Extracted

Path

C:\HOW_TO_RECOVER_DATA.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">C67BD138C04C4BFABB2C821C87C3A3F34440A25608BC2A56133FE3C0E63613EE244A610F75571BC8B986A8C9AB59E012CF76D129AD6B526E6F57F00FEFBFA1B4<br>E0EE1D767EB06266D59DD3E62CDEB3560B92CEC22686A8D3EE5099908C0CDB717DDCDF2F6F20CC8CBB3ED9ACEF4A4CAAC2CA8A495113CADFFA457C31318A<br>4FA12A72DC74006630BCBC7D75DDFF86A45EFDD9D26085AB54EACC879BC672B96024B5DD944CB84854E942E1AF19C730C5DE602AC2CFFE8B1569F924CA76<br>3E3F0296C36269972D628843CA472AD5510F08B40D5E44B9FB17B777F9E86F749114ADC9C015D551DBE38C3C19A323DC2507136EB419DBEB265F1AFEE4D2<br>5B720242115412BB3E0AAB12D84C616CEFE8344FA37520370BAA6667C2F92C7719BA29D1C168EF2E1547D83F383C65883D777AEBAF675E4265D12BC0A5A3<br>7CC28B7BD869C5599EC8DE79CD0699327795634FBBCE7894EE0E2B61FADDA62D3E1BC1315A268511C8BDE28169E16B7C87688C9274D02E8E0E8558911354<br>C93465807F3D9F8674C1EA06B36FD10817FF424EB0A96FA6C41666AA76A75FF983615C71E6CEC8F553F46B0DF9A6143AD39262DAA015872E6AEE947549AC<br>5ACEACFF7C90166D5890FFFCABB1A2CDC76F9E1DE0E44EA29A7A981D24BCF974FCBB9FA6E98570240A976604C0632B786E51D4F81F4F175303F9E015F51A<br>E5FAFE72EFBCB45BADD1BFBC7084</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>ALL YOUR IMPORTANT FILES HAVE BEEN ENCRYPTED!</b><br><br> YOUR FILES ARE SAFE! JUST MODIFIED ONLY. (RSA+AES) <br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMENANTLY DESTROY YOUR FILE.<br> DO NOT MODIFY ENCRYPTED FILES. DO NOT RENAME ENCRYPTED FILES.<br><br> NO SOFTWARE AVAILABLE ON INTERNET CAN HELP YOU. WE ONLY HAVE<br> SOLUTION TO YOUR PROBLEM.<br><br> WE GATHERED HIGHLY CONFIDENTIAL/PERSORNAL DATA. THESE DATA<br> ARE CURRENTLY STORED ON A PRIVATE SERVER. THIS SERVER WILL BE<br> IMMEDIATELY DESTROYED AFTER YOUR PAYMENT. WE ONLY SEEK MONEY<br> AND DO NOT WANT TO DAMAGE YOUR REPUTATION. IF YOU DECIDE TO<br> NOT PAY, WE WILL RELEASE THIS DATA TO PUBLIC OR RE-SELLER.<br><br> YOU WILL CAN SEND US 2-3 NON-IMPORTANT FILES AND WE WILL<br> DECRYPT IT FOR FREE TO PROVE WE ARE ABLE TO GIVE YOUR FILES<br> BACK.<br><br> <!--text data --> <hr> <b>CONTACT US FOR PRICE (BITCOIN) AND GET DECRYPTION SOFTWARE.</b><br><br> <a href="[email protected]">[email protected]</a><br> <a href="[email protected] ? ">[email protected] </a> <hr> </div> <div class="text"> MAKE CONTACT AS SOON AS POSSIBLE. YOUR DECRYPTION KEY IS ONLY STORED <br> TEMPORARLY. IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER. </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Targets

    • Target

      0f3bc144689b4ba5a96b87f8ada895b0c7a283e72aa9c533d63d6959138ca531

    • Size

      669KB

    • MD5

      1a2f56aa0186b98dc77f5f493cd592b4

    • SHA1

      fbf4c6cc257bd31c9c1628e805ce85b14284713a

    • SHA256

      0f3bc144689b4ba5a96b87f8ada895b0c7a283e72aa9c533d63d6959138ca531

    • SHA512

      07ce5bf33ef1b65ff27747c11b010e918e9d3f7616f782174614ad1785c80064af7d55b78d8f81e69c2b6f40fe535823d7116919fc80368b1f0660a00103c901

    • MedusaLocker

      Ransomware with several variants first seen in September 2019.

    • MedusaLocker Payload

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Executes dropped EXE

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks