General

  • Target

    66a13e8102f809e23e0ad0ba88ced5eecfa319797c9f709d090994a7143d858a

  • Size

    669KB

  • Sample

    220408-mw82yscdg7

  • MD5

    81276225b26444e9ff7287392b66c0da

  • SHA1

    d523010e32ea34d5b56809321b84a6c14387c9d2

  • SHA256

    66a13e8102f809e23e0ad0ba88ced5eecfa319797c9f709d090994a7143d858a

  • SHA512

    69ca15f27b75788d61e6b086c4949e65c9651a59970de0f9bab87851e19d01378be250e5be2632ca3150980f3e4f4ba3199999eb40021c073805d968c604f05c

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\HOW_TO_RECOVER_DATA.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">107272186794C5858F3E0EF7FC1259DB478D0EFF19EBBFD0761A8C32F75E12B8B5BD96FED9AD8F6257926B87CB91CE5C0D8527365E6C35F7E065F654B4014DDB<br>3940C11D78365B38C7669F690926F078AA5FD3DDFC761474DF4DE55314F2666F6C78489598BEA37C4DABD91E0F7700E9B1D5745F39F4A2B628FA1D2D6F97<br>887CB226744AAF661F531E80859F20E9EEE1393B1C16CC21E3B5135CF1BE05C7155DACB1B63865B5989DF6F6187F369F4F572A3447005F255A1BF5F65915<br>29BAC39DB97A722E843A8A57F84983A1763EA7BC40202BE8954428FA1BCD36042CD995149741CF420DA8264E7071F85867C2EB87EB12CCCC9AE7946149A2<br>B7F2DB31E13E6168216994CFE6B08DF6FC953F1446E6AFE97A0D4F5FCA16DC0563F440C7A923C71992F504CADF0A2D110245A4711A7D8493A71406EE981D<br>BB5A90BF0197BA2472210CDCDA95A799E158D00436D3904C268F34BACF17558ECD669EB9C4BD96AC43B23844B04E451D98A0B940DDE9C1CE68DCF71A3D24<br>9056EB257DE8F72730231262E1A3566B814BA1F91059356EFBA6FBDB8432376AD02BFD917332582426C7499761C1D8BBE64B53B1D1DED20015D2FB0D377A<br>A80ED803C0B4B69B752C258314892786F4F16A968BCABECF1FC5DEEEFDC5DF2D1B954A890737C300D39709AC315F8A41406015006A769E0E82E5887B6352<br>9A8CFD7438CC2F654C0A6671C230</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion</a><br> * Note that this server is available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion<br> </a> 4. Start a chat and follow the further instructions. <br> <hr> <b>If you can not use the above link, use the email:</b><br> <a href="[email protected] ">[email protected] </a> <br> <a href="[email protected] ">[email protected] </a> <br> <p>* To contact us, create a new free email account on the site: <a href="https://protonmail.com">protonmail.com <br> <b> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Extracted

Path

C:\HOW_TO_RECOVER_DATA.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">9AE451ACCC779E95FE1D3AE498BDA7396DC405ED4D0B0568372A3701706132B986CE01ED9A115C6ECB48812E80F47BA848F5B5E9CD04F70751D94F2054EBD0EB<br>E9CE77DD77BF57034603A24D9B1CA20C8CBCC996474FDF5C11E1E0974DA9B8B9D596191E681935CB03DFFF06FCC3854538E94BF135EA64C81C52CDBAC519<br>2C2AC2A3A1E43822E7F3FE496EF6A0379DA293AA383AA602A951CF55EC7CBE7F6AE4663990D42212D4992673AF31B677303192B2AB7A967B51914808F6C6<br>BD2B1A75FDB4D753998D1658583CFB6F5F8876CD25CE8A55FE1B1C9B0C6D65082B6F8CEB60379357E5C21CD0376DAECAAD604B234352160A8117A362CB47<br>6AF6FE4F393C5A750C1210F3B38766ACB0523236785F2CCC2D9EADB6C478F263D60F08A23A6CC2040165AA8B2AE985C09F096E8FA9F282502F524FF53F43<br>27BC69097C18271F416B18956F0D56A8C6D87F0F2042058486B8D31021079C23F44242F004C183B06D506AB57A4B8194B577A09A0AE63DB09575E48BE597<br>DBC0B4153195BC24E3A0FCAF6F44BFB8E34FE0BC66FF485910151B9D3D2AB36E095EC06F5A5D5C39A5DCD54F074F5A2CBCDA9684F7B93F1B72691A5A7D95<br>6F4AE0C562B94CD1BC8E47ABA7F42AE46ACE3DCB4CFD91D76A17653099AC775B6B798A6253EEDFC3E57D1DC38AB67D6A13F7472AEAFCFD23670CEB848008<br>EFBFDF7C888E54169400B40F4110</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion</a><br> * Note that this server is available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion<br> </a> 4. Start a chat and follow the further instructions. <br> <hr> <b>If you can not use the above link, use the email:</b><br> <a href="[email protected] ">[email protected] </a> <br> <a href="[email protected] ">[email protected] </a> <br> <p>* To contact us, create a new free email account on the site: <a href="https://protonmail.com">protonmail.com <br> <b> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Targets

    • Target

      66a13e8102f809e23e0ad0ba88ced5eecfa319797c9f709d090994a7143d858a

    • Size

      669KB

    • MD5

      81276225b26444e9ff7287392b66c0da

    • SHA1

      d523010e32ea34d5b56809321b84a6c14387c9d2

    • SHA256

      66a13e8102f809e23e0ad0ba88ced5eecfa319797c9f709d090994a7143d858a

    • SHA512

      69ca15f27b75788d61e6b086c4949e65c9651a59970de0f9bab87851e19d01378be250e5be2632ca3150980f3e4f4ba3199999eb40021c073805d968c604f05c

    • MedusaLocker

      Ransomware with several variants first seen in September 2019.

    • MedusaLocker Payload

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks