General

  • Target

    99a72b56725196298391f3d52b8536b018aa8b60d97c443161e912430079ed30

  • Size

    669KB

  • Sample

    220408-mwnq1shdgl

  • MD5

    6b99ae925a613a56ff3f55e730f0d33c

  • SHA1

    64b1a0e85bba047fc606bf1aa27e7e6d7378cb90

  • SHA256

    99a72b56725196298391f3d52b8536b018aa8b60d97c443161e912430079ed30

  • SHA512

    3bd3c894397818745033411143be5a7c64d97e6e3d01dd5d577c2473a3d35ce0626fc1cb10b73c95c0fd5bff79f0d4fd3857dd434e070bbb7e5687d7d141b2c9

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\HOW_TO_RECOVER_DATA.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">F7E098A02FE117699B6A3533E6AE93957A425B1E4A83D5E6FEA0F056EE31F3DF488B4C25A4F5E4EE7AE68CD6EFC248DC0D6D9786E748207A850C096DCFB3FF38<br>B205311E505057E42ED88189D14122763B983B612CC03130F3A5606870AF0E2C0093FE36E0F1F3FAC1CBA2A1303B416531B4148F7390644F71ABE7BE5D2F<br>903E82D58D7B795FF9BA0E5CF465AFD7FEF55D9ACA6DA22D5F5A1FC114A359B32111F73EB76D61F65E86FA42378AA6DDEF4CEFFE4043AE445AC75203341E<br>406112EC882D70A68398570445A13DC9EA7C8B22DA86D85443C2864E1EC0531E4B15A5CC9A14403DD78570E4FF1553FE9F5FF1EB729E9A4B93691329EA94<br>917B603BC87E7525800AF0AE018C22160E5031313E2B4561BA93FBEC50D7880E84527C07E82F62B5AE9C7B249645171A6F9F75CF7A1625D05B9A21AC8E5B<br>EF0659E3E66FD1656E1CDF24496DAB9BA70B259E18219C16497B5624BD4F5D4958F98479399E7AEEE184D2E52B2854EADFDDCAEED6C5D0976E8F213A054D<br>A555C17CE570A9C8442C64AFEBDCB622078321508154E8A26559CB55341E2A0DF1EB8EDBDE3B74F83C7899F0209C91CC680E8356C363A0ADC4EACE52FD2A<br>9CCFF2261C65B0E2A2A1B750D88A25D3C3BEBCAE11757E11AB032B216DF989FC6411DE22EA640E2B37FD512E7579F67B359C10B64515E1495D4D40F05A75<br>29F320ECCB60DB6689A293B59641</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion</a><br> * Note that this server is available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion<br> </a> 4. Start a chat and follow the further instructions. <br> <hr> <b>If you can not use the above link, use the email:</b><br> <a href="[email protected] ">[email protected] </a> <br> <a href="[email protected] ">[email protected] </a> <br> <p>* To contact us, create a new free email account on the site: <a href="https://protonmail.com">protonmail.com <br> <b> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Extracted

Path

C:\HOW_TO_RECOVER_DATA.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">673DB140F103F90ED3477B8A4E88E6669FA72AE5A59E7B5F2504B39165BAA8393082812509325B76DBCFA27C0B1F3EA09AEDDA5400BA412A5B9D8328CA2B25E5<br>B466B7A4FDC4CA4633640E8BFA0807B570968046236E816EE118E5AB473CCA678D3AFC761886B73808847BF6D1C9198C53612520B934F05FDC94DD76C812<br>3E8B351382258E7D04C94AB2BA20984384773BDD71224F334EE9A0D5F34B86D387AB318E3B1AE16CD2360CE73BD1FA71790E332D120B04155ABFEEDD92DB<br>6412EAC81544AD97B0B2666C14D8BABE12E801A78933D427851FC5253863405AD82490399FA978D2668A1652B036C3050FEDC20EC19A3A001C549DC604FF<br>BC3E742D7297D81144B97195ED980ED9679E38D39015DC79A8C035DAD87D81364DC8A81ED93B6C189E5189030FC24DC0EBBD1DA3B42951AEFBF99059F638<br>FA44137B4D50052AA01A693469728037566F67663886C16E0B36D83A75134D1CA2D77FFE658F7A259BC3182208A98D5E96F44B2C5A72FCEB9C2082450FA9<br>931ECE701E41F35BC8FB95532A89DD20FFA85E73C851EC8B1808F3C459E045C03C2C4A1DDA9F068BC2EAFF712A0408D4815639666679FA54EF2710F80F22<br>256817C55D26C4F10855FD82CB9DD6F2446986B53CEBEA7827AB1E7E1D6495DD5FC05C675950FB874394C484EA1907FC289D30F19D67A3141158DB2B2851<br>B7D5A3C61A93058CAC85801D0C03</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion</a><br> * Note that this server is available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion<br> </a> 4. Start a chat and follow the further instructions. <br> <hr> <b>If you can not use the above link, use the email:</b><br> <a href="[email protected] ">[email protected] </a> <br> <a href="[email protected] ">[email protected] </a> <br> <p>* To contact us, create a new free email account on the site: <a href="https://protonmail.com">protonmail.com <br> <b> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Targets

    • Target

      99a72b56725196298391f3d52b8536b018aa8b60d97c443161e912430079ed30

    • Size

      669KB

    • MD5

      6b99ae925a613a56ff3f55e730f0d33c

    • SHA1

      64b1a0e85bba047fc606bf1aa27e7e6d7378cb90

    • SHA256

      99a72b56725196298391f3d52b8536b018aa8b60d97c443161e912430079ed30

    • SHA512

      3bd3c894397818745033411143be5a7c64d97e6e3d01dd5d577c2473a3d35ce0626fc1cb10b73c95c0fd5bff79f0d4fd3857dd434e070bbb7e5687d7d141b2c9

    • MedusaLocker

      Ransomware with several variants first seen in September 2019.

    • MedusaLocker Payload

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks