General

  • Target

    ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387

  • Size

    669KB

  • Sample

    221005-d1tndsdear

  • MD5

    cfa482b23fa7a59641a6b816d56a3c58

  • SHA1

    0cd9753113e29fd460dcdcffb21f364b3c5a14aa

  • SHA256

    ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387

  • SHA512

    c13bb3b4463cffd39fc556fd5e0d4286a4da6eb04cbbf5d20675d819085a07dc7f616f586e30eeaea285ca81fb89acae56124fdd3f19dba5a7eca1fec9b8d9c7

  • SSDEEP

    12288:dQA0FfTcwpBuV2UxqDmuiLZeUaoFi2XZWfGe615HhAZV8DhKD/KeX:Tuf4wTuV2Ux3uIZeUBi2Te6HWMKrKe

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\how_to_back_files.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">68125E0CF32284AF4EC22DBB98765E2106E74AEA81257C5C79F35ACFAC5012F27E962BA3754FA24B664ED433300782FEB2555444DCCA1657E75CC974B509A17E<br>757E285B80CDC946916FDAFFF9D8857F0F0F8ABDCDF53003470F0E3196779DBB2944E4437D375BC100C8C29BB1856D9BF648DCCCED0257B2F298992987F9<br>EC7D488172B5C4F9873AC3C515B677C138F9A1CB8D3EA4BDC4FBDE9D10160366FB5AD80E48A8021418F5951D3F8C2F550E490B698F56525DE4646CDE961C<br>60E5DFA406DE956DBEFE5FFC0D92CCB31188C398EBAFDFE4F627AA24C6DD9F5DEAA978005E8EE449067039797B6EE4C3EF6ECD35FD9AC6976F086FFA938D<br>4C51A6533C622F4F22EA2A2378AA9A34FDF6F490BDDF0531B1D3F6E92CE10FAD9FEB9F87F4FCB8372F0CCE134B62E3BB3D59D00C97D2F042F2E5BD9CE444<br>14E6A76CF1688BFD8E1109F167DA290C9D9DB9118A5A69A08D7C8DE0E06E1949132638C999967E9AABE95B6B9396C413333B6CEA76322BE5FC2A41F9972B<br>2EB093B53B9E35EDD2E33A7D0E61FB7144D01CD94CA0FDA65DE7662BBBA43B617058E6B644D16DF0AB1A8BD7B8831FCA86B8150570C1C1BC06E17B88889C<br>97FEC1D70EF7597FF96E7F238A6750B922EB9FA2090A78E44905220CFC977601F8DA0955222C93C308E02DDD874336E1801B1AF5CC012511D93DC6644822<br>9CC867C565355821F4C74AD73975</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <a>.onion</a><br> * Note that this server is available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open <a>.onion<br> </a> 4. Start a chat and follow the further instructions. <br> <hr> <b>If you can not use the above link, use the email:</b><br> <a href="[email protected] ">[email protected] </a> <br> <a href="[email protected] ">[email protected] </a> <br> <p>* To contact us, create a new free email account on the site: <a href="https://protonmail.com">protonmail.com <br> <b> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Extracted

Path

C:\Users\Admin\Downloads\how_to_back_files.html

Family

medusalocker

Ransom Note
Your personal ID: 68125E0CF32284AF4EC22DBB98765E2106E74AEA81257C5C79F35ACFAC5012F27E962BA3754FA24B664ED433300782FEB2555444DCCA1657E75CC974B509A17E 757E285B80CDC946916FDAFFF9D8857F0F0F8ABDCDF53003470F0E3196779DBB2944E4437D375BC100C8C29BB1856D9BF648DCCCED0257B2F298992987F9 EC7D488172B5C4F9873AC3C515B677C138F9A1CB8D3EA4BDC4FBDE9D10160366FB5AD80E48A8021418F5951D3F8C2F550E490B698F56525DE4646CDE961C 60E5DFA406DE956DBEFE5FFC0D92CCB31188C398EBAFDFE4F627AA24C6DD9F5DEAA978005E8EE449067039797B6EE4C3EF6ECD35FD9AC6976F086FFA938D 4C51A6533C622F4F22EA2A2378AA9A34FDF6F490BDDF0531B1D3F6E92CE10FAD9FEB9F87F4FCB8372F0CCE134B62E3BB3D59D00C97D2F042F2E5BD9CE444 14E6A76CF1688BFD8E1109F167DA290C9D9DB9118A5A69A08D7C8DE0E06E1949132638C999967E9AABE95B6B9396C413333B6CEA76322BE5FC2A41F9972B 2EB093B53B9E35EDD2E33A7D0E61FB7144D01CD94CA0FDA65DE7662BBBA43B617058E6B644D16DF0AB1A8BD7B8831FCA86B8150570C1C1BC06E17B88889C 97FEC1D70EF7597FF96E7F238A6750B922EB9FA2090A78E44905220CFC977601F8DA0955222C93C308E02DDD874336E1801B1AF5CC012511D93DC6644822 9CC867C565355821F4C74AD73975 /!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\ All your important files have been encrypted! Your files are safe! Only modified. (RSA+AES) ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE WILL PERMANENTLY CORRUPT IT. DO NOT MODIFY ENCRYPTED FILES. DO NOT RENAME ENCRYPTED FILES. No software available on internet can help you. We are the only ones able to solve your problem. We gathered highly confidential/personal data. These data are currently stored on a private server. This server will be immediately destroyed after your payment. If you decide to not pay, we will release your data to public or re-seller. So you can expect your data to be publicly available in the near future.. We only seek money and our goal is not to damage your reputation or prevent your business from running. You will can send us 2-3 non-important files and we will decrypt it for free to prove we are able to give your files back. Contact us for price and get decryption software. .onion * Note that this server is available via Tor browser only Follow the instructions to open the link: 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site. 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it. 3. Now you have Tor browser. In the Tor Browser open .onion 4. Start a chat and follow the further instructions. If you can not use the above link, use the email: [email protected] [email protected] * To contact us, create a new free email account on the site: protonmail.com IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.

Extracted

Path

C:\how_to_back_files.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">F4CCB16A650E086F1B845ED11474728B5477E6AB7BAF9896362F8E2FD82506861BAC785990C3289B85986032DB6E1A1BB440E5752A510D8BBAEA311369BFE4C5<br>15EEC9748234B04CEA8D22BA62E33F4F82F7596C8B1774A66309FFA4BE9D836B1197BBFAC3F1352F68CDD53C973943F2E9C1897C7FA3C56C26AC2ACF10C6<br>6A4FA9927F8ED071FE24083303245689212E2F983457D0DC07C3CA988B50F1C84E88466F5D0E48E8D543605277850256DFE26B0A8717905A1F73FCA0F8D0<br>3AD7D8FC84CD2AE0EE228C5A2BA97EE69538BAFB4CCAB49B8828E89B647CF56C3060F29DFC6A6214B287C13390C6F0627512815F28AD80548E6E969DE5AB<br>A816516A7B507E7639E21AC9295AD96186CF061C1ED056F684A482A3E2FE9DD5D00B6233A401725B50881BAF5FAC826C2770ED3719233FCB427F1BC9A10E<br>5DAEBAE99EA7739C41BFAF39900F34A6D202BB96630DFBDAAD58C687CE96A0FF64A1704B24843CE665A1C0EB87732940F133F3A563EAFA67BD7FED84C5FD<br>99BE3F0586729E21F2AD55EE780B22423F786524EF6D87897F54B94F0C88B42B7E6ED3A352524478F3378D24B0B3437456F957C62264F90AF94F136DAD0C<br>F724032AB7953E0D0B7AA83634B002C8568C9FAFB6BB4229C10B1014B966D00452AD74369888F8EDE6FBD9F5B84B65E957E66EE15ECCD2038C74F2BEBA0E<br>686194BB152E99524E4534D91E0C</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <a>.onion</a><br> * Note that this server is available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open <a>.onion<br> </a> 4. Start a chat and follow the further instructions. <br> <hr> <b>If you can not use the above link, use the email:</b><br> <a href="[email protected] ">[email protected] </a> <br> <a href="[email protected] ">[email protected] </a> <br> <p>* To contact us, create a new free email account on the site: <a href="https://protonmail.com">protonmail.com <br> <b> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Extracted

Path

C:\Users\Admin\Desktop\how_to_back_files.html

Family

medusalocker

Ransom Note
Your personal ID: F4CCB16A650E086F1B845ED11474728B5477E6AB7BAF9896362F8E2FD82506861BAC785990C3289B85986032DB6E1A1BB440E5752A510D8BBAEA311369BFE4C5 15EEC9748234B04CEA8D22BA62E33F4F82F7596C8B1774A66309FFA4BE9D836B1197BBFAC3F1352F68CDD53C973943F2E9C1897C7FA3C56C26AC2ACF10C6 6A4FA9927F8ED071FE24083303245689212E2F983457D0DC07C3CA988B50F1C84E88466F5D0E48E8D543605277850256DFE26B0A8717905A1F73FCA0F8D0 3AD7D8FC84CD2AE0EE228C5A2BA97EE69538BAFB4CCAB49B8828E89B647CF56C3060F29DFC6A6214B287C13390C6F0627512815F28AD80548E6E969DE5AB A816516A7B507E7639E21AC9295AD96186CF061C1ED056F684A482A3E2FE9DD5D00B6233A401725B50881BAF5FAC826C2770ED3719233FCB427F1BC9A10E 5DAEBAE99EA7739C41BFAF39900F34A6D202BB96630DFBDAAD58C687CE96A0FF64A1704B24843CE665A1C0EB87732940F133F3A563EAFA67BD7FED84C5FD 99BE3F0586729E21F2AD55EE780B22423F786524EF6D87897F54B94F0C88B42B7E6ED3A352524478F3378D24B0B3437456F957C62264F90AF94F136DAD0C F724032AB7953E0D0B7AA83634B002C8568C9FAFB6BB4229C10B1014B966D00452AD74369888F8EDE6FBD9F5B84B65E957E66EE15ECCD2038C74F2BEBA0E 686194BB152E99524E4534D91E0C /!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\ All your important files have been encrypted! Your files are safe! Only modified. (RSA+AES) ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE WILL PERMANENTLY CORRUPT IT. DO NOT MODIFY ENCRYPTED FILES. DO NOT RENAME ENCRYPTED FILES. No software available on internet can help you. We are the only ones able to solve your problem. We gathered highly confidential/personal data. These data are currently stored on a private server. This server will be immediately destroyed after your payment. If you decide to not pay, we will release your data to public or re-seller. So you can expect your data to be publicly available in the near future.. We only seek money and our goal is not to damage your reputation or prevent your business from running. You will can send us 2-3 non-important files and we will decrypt it for free to prove we are able to give your files back. Contact us for price and get decryption software. .onion * Note that this server is available via Tor browser only Follow the instructions to open the link: 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site. 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it. 3. Now you have Tor browser. In the Tor Browser open .onion 4. Start a chat and follow the further instructions. If you can not use the above link, use the email: [email protected] [email protected] * To contact us, create a new free email account on the site: protonmail.com IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.

Targets

    • Target

      ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387

    • Size

      669KB

    • MD5

      cfa482b23fa7a59641a6b816d56a3c58

    • SHA1

      0cd9753113e29fd460dcdcffb21f364b3c5a14aa

    • SHA256

      ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387

    • SHA512

      c13bb3b4463cffd39fc556fd5e0d4286a4da6eb04cbbf5d20675d819085a07dc7f616f586e30eeaea285ca81fb89acae56124fdd3f19dba5a7eca1fec9b8d9c7

    • SSDEEP

      12288:dQA0FfTcwpBuV2UxqDmuiLZeUaoFi2XZWfGe615HhAZV8DhKD/KeX:Tuf4wTuV2Ux3uIZeUBi2Te6HWMKrKe

    • MedusaLocker

      Ransomware with several variants first seen in September 2019.

    • MedusaLocker payload

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks