General

  • Target

    f6f120d1262b88f79debb5d848ac7db9.bin

  • Size

    231KB

  • Sample

    230408-c5ppkade9z

  • MD5

    73454f9baa392bc5242e021b5893331c

  • SHA1

    53e4522fd7bd17cedf8c7d1dc8f93e7e00b0b0d4

  • SHA256

    f32b419e482fbd17e06913076385025e4def40fce4f7ec56050068e39af5b464

  • SHA512

    63f4904bbd441c2c77090f079a6ddcfcde60a8bffef8de45bf15ddc331f284c8a2da23e000a0b121449509da54d2a5039900f700aef3dc31c4f27477c4e43b5e

  • SSDEEP

    6144:fvGMQk/NeUW8uYTEwKdda8VDW5aFvAzJWMJTgEUs:xQk/4FjwErdEuS5qY1W8qs

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\HOW_TO_RECOVER_DATA.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">BC38348ABE0777D53BAF7F0E155120C348DFCE99256DC9AC530E9035002DA72815F3C08C48C23E1F7A027CB82531D093F3910925C223BABFF949AAE516E5666F<br>B9EAF034899AECB5E6116D4A06585A397621278DCEDB4E6975CC4855C30E2DE1C907ED46A1C3E98D1999577A5A794442C59E661D1F5463D0EB996EA6EB2E<br>B4F684A6F36DC51DB545F12E7B2AE72DF54DD281D445F6D639C638E5CFC9BBC0A0C951CF811C3F8312E23DC528A5587B291BECC864B538EB4505453D1607<br>4B0CFB3FCA607D4B6468E239E0AF7A27C614CC7FD4840F840E6ED42D5B2BA59A915A03858B1CAE3AED81C128B4EA7A112C7589A74B161230419C91E045AE<br>D4C78F59085FA2F2A12981D7CF4E8C3BB38D3CDFFA9C854500DFB95BF3E546CA7BDD65FF3F6781930028C5DC738C4FB61F141BE3FF389C04DFFCF76B2F2A<br>76083092BB995B42ED5A1BB8F5C108E37CA10E0ACF96AB2B13C2588513792B0838071701DE830B0ADC143D5D3EF17799625282686E838856969B3F610799<br>A79DF9A3FDC341FB952DF16C983B4A02191F038A93ACB16C78CB76D2AEEACCB629BEAFABB54C2D16D0A961DB6882A9BFF6CB0FE45F9678C79E859D64BBCA<br>7FE69C2FD0A3540FFD39CFFC537D7ADAEBFB8F51BFB44BBFF6EC2A3138BE095AD5410C2B979A3ABB3CC37A897A4BC75B1E7E7F229C50C0D0CF122270A2A7<br>B5952A8F9305305858488929CE34</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion</a><br> * Note that this server is available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion<br> </a> 4. Start a chat and follow the further instructions. <br> <hr> <b>If you can not use the above link, use the email:</b><br> <a href="[email protected] ">[email protected] </a> <br> <a href="[email protected] ">[email protected] </a> <br> <p>* To contact us, create a new free email account on the site: <a href="https://protonmail.com">protonmail.com <br> <b> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Extracted

Path

\Device\HarddiskVolume1\Boot\HOW_TO_RECOVER_DATA.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">59F5CB0F8FD311B10AB3E3CF06C4D9165F664FB05EDBD47A87CD70E05C56EAAAD896634ABC4E03359DE2F41C157C89498A2B4E2F3D1E46A527D59A00F5A59EB7<br>F7BEFFE08565A0D02DA0CC705BFBD64ACFA252EB941F1C9EB37E6D996A8D0123C7D9E0C9B0FB4392E2C5194D448C63B37FAD71500B7074AE98843D5CA5AF<br>439593E7F8553854B0B9B71F91BA9958C9AFF4318F9B976660940EAC0F4C6F8C3DAC31A50C684A96793FBC55029276E6947F83BD2CFC0B46A676B1D5D38D<br>D5D925711F4483338E4FF3127B905D9BFFD43F66859C245ADE9551648F1B1AA968D8D953E28E81C9050DDA688C33E8D2D1CB8C5A863B589CA56285AA44A4<br>756368406176A9A2118D483B1583F3A403C0838C5F4D52F4E2D2F812568361622D24CB44CD30C65D141F75AFBB5425AF9350011DB5DE6D9311B5966ABDDA<br>D4036508E27E8CD08F44D0120FD6953DABD78FC77618C2C2B71021065140F83553CB078AA978895A73CE7C096A360636D57F34587D44DDFDA0AD98921527<br>A2A2EE5E5EC3A39B9DDEA599CB1945C6C85646B73D9EE33EEBB43FB2AE4439AC93FFEA768B1E0B0D690754D4DF0E507B6FC3DCD7BDDAD43D24460CED450D<br>C91C3060828227209DDF0FBA9B50AFA48A6B4333F7AC2EB259561ECFCA6811A0FE3F4EA9A042FDF23B868A49E915D144607AF8314E7703B7F691DA4EAE27<br>9A492AE43709708851792AA12DA7</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion</a><br> * Note that this server is available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion<br> </a> 4. Start a chat and follow the further instructions. <br> <hr> <b>If you can not use the above link, use the email:</b><br> <a href="[email protected] ">[email protected] </a> <br> <a href="[email protected] ">[email protected] </a> <br> <p>* To contact us, create a new free email account on the site: <a href="https://protonmail.com">protonmail.com <br> <b> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Targets

    • Target

      1bc0575b3fc6486cb2510dac1ac6ae4889b94a955d3eade53d3ba3a92d133281.exe

    • Size

      235KB

    • MD5

      f6f120d1262b88f79debb5d848ac7db9

    • SHA1

      1339282f9b2d2a41326daf3cf284ec2ae8f0f93c

    • SHA256

      1bc0575b3fc6486cb2510dac1ac6ae4889b94a955d3eade53d3ba3a92d133281

    • SHA512

      1067c1a73cf891d651fa007f4ccc4452f32801fe3859933ef1bcc00985e35ce016fa6c601c0e3c10df2080fc9b8a776b2f18d40bd64dfb98177ab638c4b545bd

    • SSDEEP

      6144:c5vMUmRTTgwnfeP+Jx1cLNAIyBcc9WrEWUC4wQh/6BeX:/U8Tgufnx1cLNncgQWUUQh/+e

    • MedusaLocker

      Ransomware with several variants first seen in September 2019.

    • MedusaLocker payload

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks