General

  • Target

    9639048439.zip

  • Size

    300KB

  • Sample

    230320-1ebxsahd8x

  • MD5

    bbab2f291532b5d94571ce1cde705a42

  • SHA1

    7ec899713180631f564436d82558d9e3814fa3c8

  • SHA256

    c57b9ceb171de7992bb63df37bdf176ac2efde34a2dff4bb355bb417ad34c046

  • SHA512

    655e4c1c25839edd52eda7a564c9c8908cc51bd1f21f5179b5949d56b5ad40253e09bc190cbb086530149b7a29d6ed5539e096dfd8db6267d7c1339dc65d13d2

  • SSDEEP

    6144:XsgET/FMKlMEuBZaxAs+NEUNIJ5hY9/6CCS5nIFVyc9pnlWV5KeQKQ/DYiTs26eW:XsDFllMNZaxAs+L3GS5IFD9pn8vKeQKj

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\HOW_TO_RECOVER_DATA.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">9F9226B5D9F5244CAF7462195DCF02197C525728F522E3525E6280776BD1B0552F0A7BA9C5084AA1CCA81366987A12BA63FF8B97178A8C3C4C5689BE0CCBEDD4<br>B5AD25980A27742657E26D5F42EE22363720BDA9A5BD82D9D9C17E9264D5BAF8157A1733E8AF8A90C4757D52CEA9CC706E9930E0065F65792E1A8E4DAD7D<br>9EE0E57BE4B8F2E92024BC3B1E240DDE09C20105B3B96778B42821DF2208F5E74CC2C63416FDB9769FB0012856FF91BA89C2D48C628072AF67755D429CA2<br>519B45C014B26799E303DEB80D224042A35F1E4D1D4CEFDC1FF91682F981A1E7EDB9C02D162D4B38DFAE039FFE07D4902FAD4D5970CF2FF8666DBBBEFC8F<br>A76AF3995D1EE35C1D3C321575B6035FCAED2F20ABF0FE3203DFDE8CD0295AED6F91B77112AAAFDD91F574B6485824B499844F23968F2F28515E378E2BA9<br>B0C1D47DD8FDC7891E656AE00AE1061B437232BC3E23F697572CB2EE828874CEB1498C312384292905C6D2C693A236893077D1F4E84B3B394B7C104E8182<br>ED5AC451094D19C6668CFF9CC924EB1A3356C590447E88C306FB45916E80D0C7218F15C5E530E759A56E49B86F64C60051BD1DFC21F59A66B4F13A5B468F<br>23F2885A0783D67CB95F66C3E6CC3874FBA6280A306CD153BFB4619AF44777E6E278F782D1274C86C3BFA14C9C5A2A31FBAE13C33F7EF2271CF5D80E1A03<br>E2E4FB119856A7974466FD942812</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion</a><br> * Note that this server is available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion<br> </a> 4. Start a chat and follow the further instructions. <br> <hr> <b>If you can not use the above link, use the email:</b><br> <a href="[email protected] ">[email protected] </a> <br> <a href="[email protected] ">[email protected] </a> <br> <p>* To contact us, create a new free email account on the site: <a href="https://protonmail.com">protonmail.com <br> <b> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Extracted

Path

\Device\HarddiskVolume1\Boot\HOW_TO_RECOVER_DATA.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">278D149F96A3EAB2FEC996F8EF94E46C3ECE9AE5A3CB54AB76C1D3832EB0464098A9C0C052D0B3F42AFE4FDD00CB419042E92E919948F7EF6DFB596F7E687F21<br>5E8C111E7AFD93E95BCDDBCCB44208B8FDBDE29460C746529BF413790A647BF452B11442931144C249B10124D4D2A0ACA1E81BAA83A00127015D03933150<br>C4397F99004B0562CC51F24A251C404BD6E9DEB259AD4279EFF372E94A25104911819A162C3E37C02DFB79377B83834D9A8DA1F6C7C499CFEADB76B0C86F<br>645BA5EAA1F1B91466DB23597AA22CBE26E02E1A230ED7D5042BADED191914B729F60A843ED49EF54ADEC904ECE4060F6D659CEF16FB19D3EF3A14FF1F54<br>9F36D570274F4035264B824ECCDBCF4341E309641DB458C1F23B3092EACA16DE4D9DA2548EE203AA503F73EBA436709C08F77CA38829A0285F56BDDA7B2F<br>77FA2BA81CF7575F2D75A1E67AAEBC3BB3733B5FC808319D3F5BFF57177CA293293F59959889CBE1F6A2DCCC3DD67621ED5A6DB959682B1FB89C1CD522D6<br>080E758C2B201CC05EAC1049BA971BAEF6D831D42C4AB831247E390A6AE7C41031CB5F1D31CC52F0D046DF8C4902B4C87F49176213B5D8CA17540499E7A8<br>4A14D00FE544CB727CEC7EBC03869046FF9806D531B8B895C1E5EE4EC503549C0A9E54445713E9518705C93D6D129A4DA0B5EA15D147452D9CB21377CC6A<br>DE862FF47381ABBFFC3CC06AB239</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion</a><br> * Note that this server is available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion<br> </a> 4. Start a chat and follow the further instructions. <br> <hr> <b>If you can not use the above link, use the email:</b><br> <a href="[email protected] ">[email protected] </a> <br> <a href="[email protected] ">[email protected] </a> <br> <p>* To contact us, create a new free email account on the site: <a href="https://protonmail.com">protonmail.com <br> <b> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Extracted

Path

C:\Users\Admin\Desktop\HOW_TO_RECOVER_DATA.html

Family

medusalocker

Ransom Note
Your personal ID: 278D149F96A3EAB2FEC996F8EF94E46C3ECE9AE5A3CB54AB76C1D3832EB0464098A9C0C052D0B3F42AFE4FDD00CB419042E92E919948F7EF6DFB596F7E687F21 5E8C111E7AFD93E95BCDDBCCB44208B8FDBDE29460C746529BF413790A647BF452B11442931144C249B10124D4D2A0ACA1E81BAA83A00127015D03933150 C4397F99004B0562CC51F24A251C404BD6E9DEB259AD4279EFF372E94A25104911819A162C3E37C02DFB79377B83834D9A8DA1F6C7C499CFEADB76B0C86F 645BA5EAA1F1B91466DB23597AA22CBE26E02E1A230ED7D5042BADED191914B729F60A843ED49EF54ADEC904ECE4060F6D659CEF16FB19D3EF3A14FF1F54 9F36D570274F4035264B824ECCDBCF4341E309641DB458C1F23B3092EACA16DE4D9DA2548EE203AA503F73EBA436709C08F77CA38829A0285F56BDDA7B2F 77FA2BA81CF7575F2D75A1E67AAEBC3BB3733B5FC808319D3F5BFF57177CA293293F59959889CBE1F6A2DCCC3DD67621ED5A6DB959682B1FB89C1CD522D6 080E758C2B201CC05EAC1049BA971BAEF6D831D42C4AB831247E390A6AE7C41031CB5F1D31CC52F0D046DF8C4902B4C87F49176213B5D8CA17540499E7A8 4A14D00FE544CB727CEC7EBC03869046FF9806D531B8B895C1E5EE4EC503549C0A9E54445713E9518705C93D6D129A4DA0B5EA15D147452D9CB21377CC6A DE862FF47381ABBFFC3CC06AB239 /!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\ All your important files have been encrypted! Your files are safe! Only modified. (RSA+AES) ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE WILL PERMANENTLY CORRUPT IT. DO NOT MODIFY ENCRYPTED FILES. DO NOT RENAME ENCRYPTED FILES. No software available on internet can help you. We are the only ones able to solve your problem. We gathered highly confidential/personal data. These data are currently stored on a private server. This server will be immediately destroyed after your payment. If you decide to not pay, we will release your data to public or re-seller. So you can expect your data to be publicly available in the near future.. We only seek money and our goal is not to damage your reputation or prevent your business from running. You will can send us 2-3 non-important files and we will decrypt it for free to prove we are able to give your files back. Contact us for price and get decryption software. qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion * Note that this server is available via Tor browser only Follow the instructions to open the link: 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site. 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it. 3. Now you have Tor browser. In the Tor Browser open qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion 4. Start a chat and follow the further instructions. If you can not use the above link, use the email: [email protected] [email protected] * To contact us, create a new free email account on the site: protonmail.com IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.

Targets

    • Target

      1658a064cb5a5681eee7ea82f92a2b7a14f70268dda3fc7aad8a610434711a8f

    • Size

      669KB

    • MD5

      3618b68d7db4614ec8d33b5052cc0e85

    • SHA1

      15177fbb65d707b308bac50f612b795494314001

    • SHA256

      1658a064cb5a5681eee7ea82f92a2b7a14f70268dda3fc7aad8a610434711a8f

    • SHA512

      d6ab35314f9388cafc340edc4476f374faddf6b0905d736356be32fc3e77cb2baa09fedc13af5a43c10fb4631cc77e766b530e58fa47f98329e9e2371cdd7e8d

    • SSDEEP

      12288:dQA0FfTcwpBuV2UxqDmuiLZeUaoFi2XZWfGe615HhAZV8DHKD/KeX:Tuf4wTuV2Ux3uIZeUBi2Te6HWaKrKe

    • MedusaLocker

      Ransomware with several variants first seen in September 2019.

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks