Resubmissions

13-03-2023 21:04

230313-zwvwjsca84 10

11-03-2023 04:46

230311-fdzbgaac8v 10

General

  • Target

    Medusa.bin.exe

  • Size

    661KB

  • Sample

    230311-fdzbgaac8v

  • MD5

    19ddac9782acd73f66c5fe040e86ddee

  • SHA1

    24ceba1e2951cde8e41939da21c6ba3030fc531d

  • SHA256

    dde3c98b6a370fb8d1785f3134a76cb465cd663db20dffe011da57a4de37aa95

  • SHA512

    e7be7472241fdd26db48dbd0311afe821905f6d59dfb56e3dc035944b7346b0767a8af76d110c5f60c0ba0183ca3791e56d9b3c8b9ba887afa111aafc949c1d4

  • SSDEEP

    12288:vN3K5e8nbwFigzk6VVMqX8aQNRMcauV9B/rtiPnA40Q8:hCXbwFigzkQVdXvlcayDh49

Malware Config

Targets

    • Target

      Medusa.bin.exe

    • Size

      661KB

    • MD5

      19ddac9782acd73f66c5fe040e86ddee

    • SHA1

      24ceba1e2951cde8e41939da21c6ba3030fc531d

    • SHA256

      dde3c98b6a370fb8d1785f3134a76cb465cd663db20dffe011da57a4de37aa95

    • SHA512

      e7be7472241fdd26db48dbd0311afe821905f6d59dfb56e3dc035944b7346b0767a8af76d110c5f60c0ba0183ca3791e56d9b3c8b9ba887afa111aafc949c1d4

    • SSDEEP

      12288:vN3K5e8nbwFigzk6VVMqX8aQNRMcauV9B/rtiPnA40Q8:hCXbwFigzkQVdXvlcayDh49

    • MedusaLocker

      Ransomware with several variants first seen in September 2019.

    • MedusaLocker payload

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks