General

  • Target

    03ebe8dc4828536fea08858fdfc3b53237eb514fe8cf6bc7134afb41b22f96a2

  • Size

    669KB

  • Sample

    220201-tbwz8ahafm

  • MD5

    c963b021bb8c55cacd4b830c67186232

  • SHA1

    58b69e090c23bbb16b656ee750f4e5a9aff246b2

  • SHA256

    03ebe8dc4828536fea08858fdfc3b53237eb514fe8cf6bc7134afb41b22f96a2

  • SHA512

    9755275e20b1b43fe62846d29a7df59b3e0ef56c718d43a0091b887ba0d32d9bbf8147054d0ffb75691ac630ec269727b38d233b6cedf3e3492340089f3452b0

Malware Config

Extracted

Path

\??\Z:\Boot\RECOVER_INSTRUCTIONS.html

Ransom Note
<!DOCTYPE html> <html> <head> <meta charset="utf-8"> <meta http-equiv="X-UA-Compatible" content="IE=Edge"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, user-scalable=yes"> <title>Title</title> <style> html, body, div, span, applet, object, iframe, h1, h2, h3, h4, h5, h6, p, blockquote, pre, a, abbr, acronym, address, big, cite, code, del, dfn, em, img, ins, kbd, q, s, samp, small, strike, strong, sub, sup, tt, var, b, u, i, center, dl, dt, dd, ol, ul, li, fieldset, form, label, legend, table, caption, tbody, tfoot, thead, tr, th, td, article, aside, canvas, details, embed, figure, figcaption, footer, header, hgroup, menu, nav, output, ruby, section, summary, time, mark, audio, video { margin: 0; padding: 0; border: 0; font-size: 100%; font: inherit; vertical-align: baseline; } /* HTML5 display-role reset for older browsers */ article, aside, details, figcaption, figure, footer, header, hgroup, menu, nav, section { display: block; } body { font-family: Tahoma, Arial; background: #717798; } .all { max-width: 1170px; margin: auto; background: #000; min-height: 100px; border-radius: 10px; } .tl { text-align: center; color: #e03930; font-family: Tahoma; font-size: 28px; font-weight: 700; position: relative; height: 60px; line-height: 60px; } .close { padding: 15px; width: 36px; height: 36px; position: absolute; right: 15px; top:0; } .bg { background: #252a42; text-align: center; color: #ffffff; padding: 25px 15px; font-size: 18px; font-weight: 400; line-height: 20px; } .bg span { color: #f25252; } .bg a { color: #9676fd; font-size: 20px; font-style: italic; text-decoration: none; line-height: 35px; } .bg c { color: #f25252; font-weight: 500; font-size: 20px; line-height: 35px;} .footer { padding: 15px 0;} .tl2 { text-align: center; color: #e03930; font-size: 25px; font-weight: 500; line-height: 32px; text-decoration: underline; padding-bottom: 15px; } .text { min-height: 192px; color: #ffffff; font-size: 16px; font-weight: 500; line-height: 24px; } .text div { padding-right: 50px; padding-left: 50px; } @media (max-width: 767px) { .tl { height: auto; padding-right: 50px; line-height: 1.5; } .text div { padding: 0 15px; } .footer { background: none; } } </style> </head> <body> <div class="all"> <div class="container"> <div class="tl">All your data are encrypted! <div class="close"></div></div> <div class="bg"> <c>What happened?</c> <br> Your files are encrypted, and currently unavailable. <br> You can check it: all files on you computer has new expansion.<br> By the way, everything is possible to recover (restore), but you need to buy a unique decryptor. <br> Otherwise, you never cant return your data.<br> <br> <c>For purchasing a decryptor contact us by email: </c><br> <a href="mailto:[email protected]">[email protected]</a><br> If you will get no answer within 24 hours contact us by our alternate emails: <br> <a href="mailto:[email protected]">[email protected]</a> <br> <br> <c>What guarantees?</c> <br> Its just a business. If we do not do our work and liabilities - nobody will not cooperate with us.<br> To verify the possibility of the recovery of your files we can decrypted 1 file for free. <br> Attach 1 file to the letter (no more than 10Mb). Indicate your <b>personal ID</b> on the letter:<br> <span style="width:800px; word-wrap:break-word; display:inline-block; color: #ffffff; font-size: 10px;">F7AAA52D87AC827D2CB44D47467331F8E785E992E9927946D09224571449BFAD5F723DB0BADF8366A4DB2D0052884A6D9FDA83F466EF5464BA9E95C9A571B610<br>F623E7359D886AA65955CAE87E2285970652225F5DDD978BF400DA1A354DC3B07FBAB7DA2E2345DD052CC56F1DCCD0B05A3683D671678DDA269CF4F3BB55<br>41570E76DACE5182F0D3E6212F35F86F14458AC3C7D81B84B359E68814C15317E9940B4F106649E790FBCB03D1C687FFED32509666086510EA552B948AD8<br>3F7786D6DD4F2328C78ADB7B551B889440731AD6B40E4C2559DF83F964D479D8E370E8F4BBC14D1E377EFB82083A5DFB4CAF9FCAD943588DCDC1079502DB<br>78EF45AF629184652C54F1E54A089D6A9D60DEC63E5907757B5FA241B9880720F880EE3BE814F79AAE2E525EEA1E593F7558EA4BB19FCD817F6C8DF4D30E<br>DE1867F5DBFCB161DEC3609DB094CE1C19B81674715E0B50C4AA410F425211F970D7A7D74A98AD7414C04D268B5D615382A8B27A178AE70DEA80BC731A21<br>8D65A54456B0895DACC6E584713BF7680344CC00F75581C124340BEF120E5AB8D80FF4DCFF9A09BE521E7E41305C71D2BD553889B0F2F55697AF6D8C72D2<br>AE48E5BF8879CF7FB57272A8FBCF1D2B29EE23F8997A5DE5DDDC5A06E44942601946753EFA2DF66884343520991B83A079A0A93A9E63190C059CEFF25EBE<br>602B0A63481FF4BC05B8F21F7F07</span> <br> </div> <div class="footer"> <div class="tl2"> Attention! </div> <div class="bg2"> <div class="text"> <div> - Attempts of change files by yourself will result in a loose of data. <br> - Our e-mail can be blocked over time. Write now, loss of contact with us will result in a loose of data.<br> - Use any third party software for restoring your data or antivirus solutions will result in a loose of data. <br> - Decryptors of other users are unique and will not fit your files and use of those will result in a loose of data.<br> - If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. </div> </div> </div> </div> </div> </div> </body> </html>
Emails

href="mailto:[email protected]">[email protected]</a><br>

href="mailto:[email protected]">[email protected]</a>

URLs

http-equiv="X-UA-Compatible"

Extracted

Path

C:\RECOVER_INSTRUCTIONS.html

Ransom Note
<!DOCTYPE html> <html> <head> <meta charset="utf-8"> <meta http-equiv="X-UA-Compatible" content="IE=Edge"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, user-scalable=yes"> <title>Title</title> <style> html, body, div, span, applet, object, iframe, h1, h2, h3, h4, h5, h6, p, blockquote, pre, a, abbr, acronym, address, big, cite, code, del, dfn, em, img, ins, kbd, q, s, samp, small, strike, strong, sub, sup, tt, var, b, u, i, center, dl, dt, dd, ol, ul, li, fieldset, form, label, legend, table, caption, tbody, tfoot, thead, tr, th, td, article, aside, canvas, details, embed, figure, figcaption, footer, header, hgroup, menu, nav, output, ruby, section, summary, time, mark, audio, video { margin: 0; padding: 0; border: 0; font-size: 100%; font: inherit; vertical-align: baseline; } /* HTML5 display-role reset for older browsers */ article, aside, details, figcaption, figure, footer, header, hgroup, menu, nav, section { display: block; } body { font-family: Tahoma, Arial; background: #717798; } .all { max-width: 1170px; margin: auto; background: #000; min-height: 100px; border-radius: 10px; } .tl { text-align: center; color: #e03930; font-family: Tahoma; font-size: 28px; font-weight: 700; position: relative; height: 60px; line-height: 60px; } .close { padding: 15px; width: 36px; height: 36px; position: absolute; right: 15px; top:0; } .bg { background: #252a42; text-align: center; color: #ffffff; padding: 25px 15px; font-size: 18px; font-weight: 400; line-height: 20px; } .bg span { color: #f25252; } .bg a { color: #9676fd; font-size: 20px; font-style: italic; text-decoration: none; line-height: 35px; } .bg c { color: #f25252; font-weight: 500; font-size: 20px; line-height: 35px;} .footer { padding: 15px 0;} .tl2 { text-align: center; color: #e03930; font-size: 25px; font-weight: 500; line-height: 32px; text-decoration: underline; padding-bottom: 15px; } .text { min-height: 192px; color: #ffffff; font-size: 16px; font-weight: 500; line-height: 24px; } .text div { padding-right: 50px; padding-left: 50px; } @media (max-width: 767px) { .tl { height: auto; padding-right: 50px; line-height: 1.5; } .text div { padding: 0 15px; } .footer { background: none; } } </style> </head> <body> <div class="all"> <div class="container"> <div class="tl">All your data are encrypted! <div class="close"></div></div> <div class="bg"> <c>What happened?</c> <br> Your files are encrypted, and currently unavailable. <br> You can check it: all files on you computer has new expansion.<br> By the way, everything is possible to recover (restore), but you need to buy a unique decryptor. <br> Otherwise, you never cant return your data.<br> <br> <c>For purchasing a decryptor contact us by email: </c><br> <a href="mailto:[email protected]">[email protected]</a><br> If you will get no answer within 24 hours contact us by our alternate emails: <br> <a href="mailto:[email protected]">[email protected]</a> <br> <br> <c>What guarantees?</c> <br> Its just a business. If we do not do our work and liabilities - nobody will not cooperate with us.<br> To verify the possibility of the recovery of your files we can decrypted 1 file for free. <br> Attach 1 file to the letter (no more than 10Mb). Indicate your <b>personal ID</b> on the letter:<br> <span style="width:800px; word-wrap:break-word; display:inline-block; color: #ffffff; font-size: 10px;">2F7E7942554143CE14E370343E6B4DD771B19978FE7C17E63693A272CF2F497E8935D76AD17EECE4E825A0BF7CC573EE8BA95B2FA395CED8DB581B78DD50CE9F<br>753A5CE4B6EE11E89948EDDFA8059992B73B1A9BBA49390E1517CC32745BBDF3B8EE0BBB3AFA1E608AA883366CFC25FEA099C74DC58E1C9D63A944EDC7A5<br>12157F1035DDC7EDA4B536F0647CDD5BBE114BF9FFA6E4035C562DD3CA4A3EAE4B00085B5DD7A775BF5C36C9C9E200989CBC09D3DE485880008DAB549FDF<br>6ADF8FB796ED8F9E03BB0EB1B84B38CE70DC0302118FA78B28706098C03F4D82E293695E11FAAF67190F177AB0599409088FE85E2AE7393C73982F0DF53D<br>89143F6F6C2B2859D5AD5FCACE331EAA9F721E17E543E675AFC91AE85200E150B201B4A7B3FCCE0B60E3B9FC545538112FC5CE00CB88BB4FF2FEDFDFD0B3<br>7BB8C2802A97D96B9EB5B5E76E913EC78B3B0BC7C978E53EA8BC06E0C5B6EB8A50500D6122A342BD326D67BF9505F8653F92D25F5D073A7F3DAC3CE33C17<br>07D541528DAE0943C339A58DC7B45D5EF7DA2B78C4C56774096E8305E3617C95CEB37B78E8B392F87A191892E75B8413C25764DA514A53491E60684217C6<br>841F7C6A23D70429983585C31A55F16962D139AFAC5FCAEB6D780A61A3D2DB4559E7163DDCDD2726BB4704A12FA8C2B1197FD70BEBC4E47CDB130927E767<br>F21165AD4DA7C86BDBB4DB98AEA8</span> <br> </div> <div class="footer"> <div class="tl2"> Attention! </div> <div class="bg2"> <div class="text"> <div> - Attempts of change files by yourself will result in a loose of data. <br> - Our e-mail can be blocked over time. Write now, loss of contact with us will result in a loose of data.<br> - Use any third party software for restoring your data or antivirus solutions will result in a loose of data. <br> - Decryptors of other users are unique and will not fit your files and use of those will result in a loose of data.<br> - If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. </div> </div> </div> </div> </div> </div> </body> </html>
Emails

href="mailto:[email protected]">[email protected]</a><br>

href="mailto:[email protected]">[email protected]</a>

URLs

http-equiv="X-UA-Compatible"

Targets

    • Target

      03ebe8dc4828536fea08858fdfc3b53237eb514fe8cf6bc7134afb41b22f96a2

    • Size

      669KB

    • MD5

      c963b021bb8c55cacd4b830c67186232

    • SHA1

      58b69e090c23bbb16b656ee750f4e5a9aff246b2

    • SHA256

      03ebe8dc4828536fea08858fdfc3b53237eb514fe8cf6bc7134afb41b22f96a2

    • SHA512

      9755275e20b1b43fe62846d29a7df59b3e0ef56c718d43a0091b887ba0d32d9bbf8147054d0ffb75691ac630ec269727b38d233b6cedf3e3492340089f3452b0

    • MedusaLocker

      Ransomware with several variants first seen in September 2019.

    • MedusaLocker Payload

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks