General

  • Target

    053680ED933D58F4150FFDEFAC4D9F13.exe

  • Size

    669KB

  • Sample

    230418-fwfl3sbd7z

  • MD5

    053680ed933d58f4150ffdefac4d9f13

  • SHA1

    69c4a4ffb650a6fdfe343d6acca3b988647aee30

  • SHA256

    af768da08a34ddf503522186a22e65e623491e48754356210cc6798598f85266

  • SHA512

    4ed454e96f65c2a7cefbe27a499e2fb3eeea8512e704aae7de4245e0a0d38788ec7366937a68a57b714681da3f43ebddf32241756f0f0e6eb63488c8c3966de2

  • SSDEEP

    12288:dQA0FfTcwpBuV2UxqDmuiLZeUaoFi2XZWfGe615HhAZV8DnKD/KeX:Tuf4wTuV2Ux3uIZeUBi2Te6HWmKrKe

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\HOW_TO_RECOVER_DATA.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">529D1CEE89505ECB41D74E3D2282B92243E0B7EA605929180D58120FEDDF8B7D0EB78F826646D42FDDF1F61DAE7BBD7FB6DE8814278798FDA7BEB8B0848F9276<br>DA3CF50A4F1252940B38A9B39E1B98A522327BDD2B1082796D292592E8A0DE9649634A31A55EB0F69C67CA609F2F69ABC67E090DAE9694F97B5DDE73C1EE<br>ABED669598D88E9EAB17C8697E070E9D14FFB2121BC695EA6873FEE50D48392B13A7580E59E06495283EA80671ACE4F199919F65A6E09C226D53E89BCA75<br>797D99ADBDBFAC2EF29337F483A542BC679785A10B9D7AD53904C7B9062BDE0ABDB43329113AFD6FDC2332044B880CBEBF643B2DA1A7640F5DC8608E1338<br>F90C1D885C6DEC33465C087239A51EEB6605BFBA24AAEAC45CFE5DB92525CAA8134B36967E075449D76269481E3B2670C2BFDA8061E288E0137A268C2865<br>E0D8A5075E3EB5B652BD5E27A90A06A40097A6AEF282228105A7C5A441FF23FDD35777074BFF66744D47C82655A08BE5D421A6E0E6E6FD874E7A49977060<br>49438A9DE337D28FD933BBB6A318E4FB3E06BA99073042E21EBBD5ED0D912201C5ED2D454F7A08154BFB0516552AD517F04F18C6AE0D332976EA16E7F717<br>7282A8B6B2FDE8300E0A92A01E28FD60D79A862D8828C8126D47ADF4DE9B24ACBBB4B179CF742B2C21D1B80863BCD1CD58783AFC85F06C008AE4B8D47EF5<br>CFB0AE74437ED4DC8242CDC1C45A</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion</a><br> * Note that this server is available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion<br> </a> 4. Start a chat and follow the further instructions. <br> <hr> <b>If you can not use the above link, use the email:</b><br> <a href="[email protected] ">[email protected] </a> <br> <a href="[email protected] ">[email protected] </a> <br> <p>* To contact us, create a new free email account on the site: <a href="https://protonmail.com">protonmail.com <br> <b> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Extracted

Path

\Device\HarddiskVolume1\Boot\HOW_TO_RECOVER_DATA.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">84EC80E89115B654DFAC3F45D62398DD2A43908C9550C56D162791692A8773564397836BA48770299A196F4E133EB17913A98A71F893B37855186B4C625622DC<br>0DBF18F672DC579F24979BCB7981BA753C4E7931ED27B84BC8D9E486098278D97F6484D784BD399263E77B30F9FE652BA7C2BEA31EFA95E4936E0C83DA49<br>858F3C73EE12D1192FF81CC3423D68DE13F1AB77B7D6BA35E71D59B7C0D896ABA3F6E5945A3F78871D9CE93359F66E21F470604CA449ACC18440DE93AF41<br>2C49CED0B241EE7A6A1AE9F353B4FFF7B94F602159D3B09AFCD5C14E30D8880C43E06DDD4828B6D02BA25AAACA2EFC1DB9574168C35C11B96816A09EA10A<br>5141EF81CB72B7499DA00EFF97C916FD1005F1A022D64D3EF7675C165A72538505B6EA29DD3684F70998C00A3D62AC1E05131384B05920E6C28905E85623<br>08C17539045550F4A972ED13F072490F754E1FF79A232B9DBD5D3926E879F22BD32B7DD6CFB27F0356EE03791AD6EB567ECD49428FB2FD32EB8E05AA44BA<br>2144A096347409F0F0FAF728674B1E05FBDD3C6DB89D811B3079891FEE915DAC929FC82BB447B9712C8F808663C17F153A246D08DE52D5BB427AC0A25F23<br>A31F4F4FE2DE5BDBC827C09896AA3B23B148E18598B37EBC45ABC3E97BF6485790BA015ACA2A844A8BEE263A963B60193F20FBEDC5B15D758D40C0825B4B<br>390C3E330CB4F0E0FE4419A32483</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion</a><br> * Note that this server is available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion<br> </a> 4. Start a chat and follow the further instructions. <br> <hr> <b>If you can not use the above link, use the email:</b><br> <a href="[email protected] ">[email protected] </a> <br> <a href="[email protected] ">[email protected] </a> <br> <p>* To contact us, create a new free email account on the site: <a href="https://protonmail.com">protonmail.com <br> <b> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Extracted

Path

C:\Users\Admin\Desktop\HOW_TO_RECOVER_DATA.html

Family

medusalocker

Ransom Note
Your personal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ll your important files have been encrypted! Your files are safe! Only modified. (RSA+AES) ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE WILL PERMANENTLY CORRUPT IT. DO NOT MODIFY ENCRYPTED FILES. DO NOT RENAME ENCRYPTED FILES. No software available on internet can help you. We are the only ones able to solve your problem. We gathered highly confidential/personal data. These data are currently stored on a private server. This server will be immediately destroyed after your payment. If you decide to not pay, we will release your data to public or re-seller. So you can expect your data to be publicly available in the near future.. We only seek money and our goal is not to damage your reputation or prevent your business from running. You will can send us 2-3 non-important files and we will decrypt it for free to prove we are able to give your files back. Contact us for price and get decryption software. qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion * Note that this server is available via Tor browser only Follow the instructions to open the link: 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site. 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it. 3. Now you have Tor browser. In the Tor Browser open qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion 4. Start a chat and follow the further instructions. If you can not use the above link, use the email: [email protected] [email protected] * To contact us, create a new free email account on the site: protonmail.com IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.

Targets

    • Target

      053680ED933D58F4150FFDEFAC4D9F13.exe

    • Size

      669KB

    • MD5

      053680ed933d58f4150ffdefac4d9f13

    • SHA1

      69c4a4ffb650a6fdfe343d6acca3b988647aee30

    • SHA256

      af768da08a34ddf503522186a22e65e623491e48754356210cc6798598f85266

    • SHA512

      4ed454e96f65c2a7cefbe27a499e2fb3eeea8512e704aae7de4245e0a0d38788ec7366937a68a57b714681da3f43ebddf32241756f0f0e6eb63488c8c3966de2

    • SSDEEP

      12288:dQA0FfTcwpBuV2UxqDmuiLZeUaoFi2XZWfGe615HhAZV8DnKD/KeX:Tuf4wTuV2Ux3uIZeUBi2Te6HWmKrKe

    • MedusaLocker

      Ransomware with several variants first seen in September 2019.

    • MedusaLocker payload

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks