General

  • Target

    1bc0575b3fc6486cb2510dac1ac6ae4889b94a955d3eade53d3ba3a92d133281.zip

  • Size

    231KB

  • Sample

    230503-zw9dyaad91

  • MD5

    8b2a5e5352d059e718d278786ef04be2

  • SHA1

    8e91448faa0188b7639b8d74ca92e35ccb07a406

  • SHA256

    b6c034a912a026b8c1f269e005d6401feb645689feea2afaa0ed665558553b62

  • SHA512

    9c2dab6183b3e7e15fbf06280cd215f98990b12171b603a2e2a893825fe12bd6edb741590de1bcd4e5e59474645fb9449cd424d8642a8385e97737cfbcafa856

  • SSDEEP

    6144:DukWsnmM4zdk4xIMurUCktAfFMuV4dQLcjCr+IL:6kEMSdkcjtVkqjC9

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\HOW_TO_RECOVER_DATA.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">8319C6E6DFAAA80F1F7EEB591EE61C56302F4CB25CD60FD447512FD56C65B27C494F21C592A7470A2107EE285572DB5A259F1C96828458CB3CC64CA7C65DAE93<br>B74CED87C61B03EAFBD61314342140E3CA633C8EEE7F568A364BC919BF965488E695A2C0E5521F421AAA79906FADEB66F0C59A3AFCB1C90C186FC9D4E2B7<br>BC7B95463FE6A09A71D0C72A6AE3A47367812A1E60D4BA17521DEE11D91E2DF445DA518FD492DA8D2B3CA374336D8FE615432FEFD3CF761B62D0E3F0BC3E<br>5210215933E3C7E6763951CB5B79B0084064B484DFE3DB7F9487A8D98EC98D4FAE558C2BB2D8CB70E603DD838184E15B1A276948CEC0ED24A19FF53F9E8B<br>7ABC4E062E77F6235093F7D0009DBFCD19D21450727A5F27EEE29FB996DAAA5A755AF0F721FEFD90F97A7C353EFBA4E24E84D4BDCA33004B0E4D819E213F<br>418BBDAFB732FCD7AC2F9AE117B15B03039D2952128D8ABDBAB867143F5DDDEE1935353BEBBFFB7555F56CDDDEF2FFE61D2974317702EC4190E53BE1D686<br>FE40928592281D84847E6B4E0B59C3AC0DEE0575102619301771D58B43A9953507D7D6FF0657A5465193899A4DC8ECB82B020F180D0303393774ADBD3C6B<br>CD9361D9DD925F44CECC01B0DF0242CAA10145A6B202596CEA7798108DB1204B9B5335D3D521A608FEBB65FC458BFAD270F0D8A8238027790D3F117FADF3<br>7C4EAF78FB03F13835436FF6C128</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion</a><br> * Note that this server is available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion<br> </a> 4. Start a chat and follow the further instructions. <br> <hr> <b>If you can not use the above link, use the email:</b><br> <a href="[email protected] ">[email protected] </a> <br> <a href="[email protected] ">[email protected] </a> <br> <p>* To contact us, create a new free email account on the site: <a href="https://protonmail.com">protonmail.com <br> <b> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Extracted

Path

\Device\HarddiskVolume1\Boot\HOW_TO_RECOVER_DATA.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">8C5A5EADFF69306CBC42606BE30427A65C97A2A3E7D5DD2AC7B386FDD2FDB490E0B8F4F1D9CB943284F36CC8567207C60D8A904235E1DD501339CB3B817A7F65<br>9EAA7B34C350CE0267041A1F976CB6DEEBE69A04384B7F0696544FBD317E18EA7D455F050B894A9C78E6C8DD7C8C16762BC305F99B47BD64749279D07BB3<br>6E38029ECECD206DC40CCDEA96FFC262B2E43E7140D15809E180B4C23AD1EDD42F7748A9EA8BED0599D6696C1745A022C15DBC991EF7C8E720DF4353CA60<br>216BE3CC1405C4D08E4C8F6B04915A145044BDDEE7C567D60222B4195B1B10E78B64BBC06646E77290330B5B3D3CFB9C9DED759401C7C97BBBCA9F085F40<br>D23F67F909251E5733A90F61CD22C0A03198745E4C7B692E1D24DC67E67F037A766440587C330994DC333AE96947E0D4A94C1F27CCB47EA03EEF86909FA6<br>BA6AB73DB23CD8FB361AFAF328B5B129DF2E8ABA6AA821FBE00CB0C1503C7B958E4A389E79A42B41DB894A22D28AC939ACF11CE0F83B924B3174101BC6C2<br>013E02ACFA38772525AF32B55F23CB67DECA8FCEF4D23B29309E0499F927FC36433938455135CDAFB31BC6A255FCEF10BF234AFBFC52EC952D24F27DAABA<br>D677890C59B74D45DB74466AD0754DAFC51329EF65A7456F48513AAC131E2D186258724D5C652E5141FF9DA16573E244F1415F12ED648DDBB4170C397125<br>B822968F78E4658BF3BBE650312C</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion</a><br> * Note that this server is available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion<br> </a> 4. Start a chat and follow the further instructions. <br> <hr> <b>If you can not use the above link, use the email:</b><br> <a href="[email protected] ">[email protected] </a> <br> <a href="[email protected] ">[email protected] </a> <br> <p>* To contact us, create a new free email account on the site: <a href="https://protonmail.com">protonmail.com <br> <b> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Targets

    • Target

      1bc0575b3fc6486cb2510dac1ac6ae4889b94a955d3eade53d3ba3a92d133281.exe

    • Size

      235KB

    • MD5

      f6f120d1262b88f79debb5d848ac7db9

    • SHA1

      1339282f9b2d2a41326daf3cf284ec2ae8f0f93c

    • SHA256

      1bc0575b3fc6486cb2510dac1ac6ae4889b94a955d3eade53d3ba3a92d133281

    • SHA512

      1067c1a73cf891d651fa007f4ccc4452f32801fe3859933ef1bcc00985e35ce016fa6c601c0e3c10df2080fc9b8a776b2f18d40bd64dfb98177ab638c4b545bd

    • SSDEEP

      6144:c5vMUmRTTgwnfeP+Jx1cLNAIyBcc9WrEWUC4wQh/6BeX:/U8Tgufnx1cLNncgQWUUQh/+e

    • MedusaLocker

      Ransomware with several variants first seen in September 2019.

    • MedusaLocker payload

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Target

      out.upx

    • Size

      669KB

    • MD5

      3f002221f0a15187df187cb222d0cb6b

    • SHA1

      0fa815635807c05c2f0e85f0f09362a8e90d1324

    • SHA256

      ae00ad8ba6abc6ddac815187f1285cba597d0af8fa4d5ffe429bffb3b6140b5b

    • SHA512

      08bab72bb09b96685f949845858cbaa4f709f7069971ad1f36849cd3f8fde699c1a2d1c0ae5ee397d57057c81c98f6be41c64caaa5e9435d92e10fa1623660d5

    • SSDEEP

      12288:gQA0FfTcwpBuV2UxqDmuiLZeUaoFi2XZWfGe615HhAZV8DdI:Muf4wTuV2Ux3uIZeUBi2Te6HW4I

    Score
    1/10

MITRE ATT&CK Enterprise v6

Tasks