General
-
Target
14263-Q-CTI.zip
-
Size
290KB
-
Sample
231106-qmapksch93
-
MD5
8921fdfb632901368e1f195d252e5a4c
-
SHA1
d71b86e7476cd2d6dc34c429b56cad84f1d9c839
-
SHA256
f1e6e660f0fe1b7e57697661a59c948942688e379b4b4b64274843e8418d18cb
-
SHA512
3295aa3192b0d53064b6ef4e3dcf6d8873414106ad93dd8893642cf68f68088a8bb39cce221d55be3e7091b57ac272233daebdf9af58321fe9255d21b2d2d701
-
SSDEEP
6144:qG5VsJsr9QHfCtXX0yukfzWb8pcsSjnjMk2ModW1DfnPPwqi/:V81Hf+XgrrsSjnjb2Mo0D3C
Behavioral task
behavioral1
Sample
14263-Q-CTI.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
14263-Q-CTI.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\HOW_TO_BACK_FILES.html
Extracted
\Device\HarddiskVolume1\Boot\HOW_TO_BACK_FILES.html
Targets
-
-
Target
14263-Q-CTI.exe
-
Size
669KB
-
MD5
ca74bacf835fc1effa36a5c7966c18b5
-
SHA1
cd2ca5370811e30999225d15d0eaebbc889db513
-
SHA256
3964c77cba25aa842d89dc9a6ac1c50c473fec97f0f798d8fb815d76dd1257cf
-
SHA512
aab1de901b5a5a47e9ba91bf99483462e3e765ab610346d1a8582fe3d5a432dbedaf80c23a4752a6e6de13db4e5913b2e89073cdcb610d26e1f0fb7ad052d872
-
SSDEEP
12288:dQA0FfTcwpBuV2UxqDmuiLZeUaoFi2XZWfGe615HhAZV8DOKD/KeX:Tuf4wTuV2Ux3uIZeUBi2Te6HWHKrKe
-
MedusaLocker payload
-
Renames multiple (218) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (307) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
2File Deletion
2Modify Registry
2