Resubmissions

30-11-2023 10:51

231130-mx5qxsah79 10

29-06-2023 20:59

230629-zs72psfa95 10

29-06-2023 16:29

230629-tzp7ksec27 10

General

  • Target

    medusa.exe

  • Size

    235KB

  • Sample

    231130-mx5qxsah79

  • MD5

    f6f120d1262b88f79debb5d848ac7db9

  • SHA1

    1339282f9b2d2a41326daf3cf284ec2ae8f0f93c

  • SHA256

    1bc0575b3fc6486cb2510dac1ac6ae4889b94a955d3eade53d3ba3a92d133281

  • SHA512

    1067c1a73cf891d651fa007f4ccc4452f32801fe3859933ef1bcc00985e35ce016fa6c601c0e3c10df2080fc9b8a776b2f18d40bd64dfb98177ab638c4b545bd

  • SSDEEP

    6144:c5vMUmRTTgwnfeP+Jx1cLNAIyBcc9WrEWUC4wQh/6BeX:/U8Tgufnx1cLNncgQWUUQh/+e

Malware Config

Extracted

Path

\Device\HarddiskVolume1\Boot\HOW_TO_RECOVER_DATA.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">805D949EFEC1C85376DC5F480A6358332CC6206565A7C2D672F6143460319FF7CEEE1C55F6ED8429E95A7DAA5A8EA7B129D356E0A2AE5204697BC7B45F2FC95F<br>E996B2EA60E64E6474454598FFCF401402D13ED5F003B91F426018D8CCC22202BC2BDFCF8CD100B2F40677C805AEB62D07291A814CE5FF304FA4CEF2B983<br>E1CEA16E024E99BC16F84B0AD48B4A3295A4060EE630EDF029E5B7BC0B7C4F0B698C2670C7EC4590C8CD85B4FE5E177B9293F25911B1F0E807764015D922<br>BDA79F938284237D324346B06A90802C8037D92636FF44EA6387427379F8DAB76034115FA87F4C0D0E548CC14E52A37BB21DCFD71AB6E847AE56492F68B5<br>821C9E90CA86444CD377C8B5F7E1DD040EBBB080AC1E25B26049633A129B6A8193D25F268E09F90609745590E2D441663D74655525248BB2B7BF35B1275D<br>B93825F6143BCF879051E0E759FB6226A1ED12E7843428E34105A6496264C5DE8AD960299B807DF40D4318B3CF6ED148938029BA485E3ED794D93CE9CF86<br>4183B41979586B1BD734B25F07886CB8AAB31B69CFDFF2EA0EC900202894E95FA02BE09504A2A08D75768BF89FF95ACFAF7086750A8B8726B8E2AF35C136<br>A13BF0A7A708508ADB97FF9BC6639EB992C39661C3FC60FB79B91CF1D55A562141E4F2F2FE6098D8CC1FEFAE0E24C71CA3D75BADFCF448382466EBE0CE10<br>5EE442CE736031D33B9613080D93</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion</a><br> * Note that this server is available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion<br> </a> 4. Start a chat and follow the further instructions. <br> <hr> <b>If you can not use the above link, use the email:</b><br> <a href="[email protected] ">[email protected] </a> <br> <a href="[email protected] ">[email protected] </a> <br> <p>* To contact us, create a new free email account on the site: <a href="https://protonmail.com">protonmail.com <br> <b> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Extracted

Path

\Device\HarddiskVolume1\HOW_TO_RECOVER_DATA.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">AC061CC28864DFDB34964C1B6E56A7DB6719D430ED31B6C0B1538D5076C5A859469FEEC2E118E69C0BA9AAE8964F290D38A4DCAB71E0C5925886C313EF9E01E2<br>8689B957CFA6869DFE5EE2ED7B917C0F2D9A42ED1E598EC47E7566B00F646FA92F1F90C317048AEFE3B05278B5368F9E7614E55D0B513450304A4B543BC4<br>E87E88AEB561D4E143DC3DEE129AA4AB360477052D971FABB7D0AC0A841469DEF1F30429F79FD97D29860F65BB2570E922A2986D18F6C85E23441610A135<br>00BD2EF7DD7001FF6495A88D340221AF90EE2E1C1A2AE1FBDB941EF099DAB2AA10D616F2D6C5E7D717543F32ACAAE3699466F4ED84823FCB57C4A9501515<br>2A051CBD058538008D6E0A78C29D542C682AA2BA51166B53D7AD118204D47FEB48D5571C9A14A2E96F4FA51B500807B6A87FE681CA640BCBC9D8D893A026<br>DC64EC8AB5B6EABC427E538DE741BE527CB0B5C54082E805076C9B5796D8F6E3E56523BE1976D17FFA38896F689ACC7C681C24E11589716F80E8B15F8204<br>35D742615AD08809F98A8737229B9222DCA24BCF22216005DA11ABC8FA80765A2462F5955558D252244C0DB0B32B99FFEAE748DDBF9B6A31181E30AEA69E<br>14DE092BF6643CCCDFB4EEB7EB3B1B9107C423D4755F5879F8893FC41945F2D25396A0AFB7988C88A4F343926D5B8CB5A8E572CFB7FB673C5295B2ADF65C<br>F4D420EF73A48C8CBEE0B9948744</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion</a><br> * Note that this server is available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion<br> </a> 4. Start a chat and follow the further instructions. <br> <hr> <b>If you can not use the above link, use the email:</b><br> <a href="[email protected] ">[email protected] </a> <br> <a href="[email protected] ">[email protected] </a> <br> <p>* To contact us, create a new free email account on the site: <a href="https://protonmail.com">protonmail.com <br> <b> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Extracted

Path

\Device\HarddiskVolume1\Boot\HOW_TO_RECOVER_DATA.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">F09A2668849B835134F26ED3E1F0A99CB3B2C1333E9A2D59872EF190839AEA80EE6E3A4B50939EECE855AA917D98C97E438B785D15F6FB11473C09F44A5698C2<br>2BC5615708099C64CAABABE678187D23A9434A0E62AE708821A90A650E4A64FF76B00B6C9F11BAD12E77A16FAA54F24EE541B9F05FF52378EA4A9AF5D9EF<br>7A0AF1354917B37290702ECEF848A6CB9E4FC9B4DFCB00E2792DD1AFBFFBA3740B52376033B2E064430E9D2CB1B5C0CD2C4C2D3D889A6D287567C18AD801<br>4E9450DEAD4AA4B0B194251C1483F0A822B3BB62281489B3D38913C667FA6120548AE07B9DD09D5FFC98372D06E2B4DAC6A1D4F2A20E696DBB7E1369E794<br>0B51541536241BF6E63959A086E738C6183B658CEF2B983FD03F449CB156242A9A2847AE3EA14347F6606E7387E125339887359D41B4373690E3E24758D1<br>81EA39DFEB09EF27A13DA4B4C2DA2448E3009A80553F7B53BB2B2B4FCC94A1A2410439B5754ACC0CDF510979ECDBEEE0FC7B2A29C90BE03B9A09FAAED80D<br>7F5E7F585B6B26A430EBBEA977C373E00DBE92502634896896A8A4139ADA133DC5EBB53E297B1DE8BAE17D29CD828AD262DDB00D537E37F761B53405A8E7<br>A26A63206BA5B1B6609A7494866F716CBDE7E0540E232F144236C611B685707024D3EDFC62A5729A793ABBA9BE9D11AE66FFB83CCA7279562D3638B3598F<br>1BEEA7DE87D490101979E817753E</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion</a><br> * Note that this server is available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion<br> </a> 4. Start a chat and follow the further instructions. <br> <hr> <b>If you can not use the above link, use the email:</b><br> <a href="[email protected] ">[email protected] </a> <br> <a href="[email protected] ">[email protected] </a> <br> <p>* To contact us, create a new free email account on the site: <a href="https://protonmail.com">protonmail.com <br> <b> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Extracted

Path

\Device\HarddiskVolume1\Boot\HOW_TO_RECOVER_DATA.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">60352F7E74503AD50DB9DE45F985B4A0747FD2812A3385ECEBB56C750C60B621D795EF0DD16955D20E52921F51111C535368D0622A34A5AC55C280D4EE6B2608<br>F11F02661CDD553E03A2F120D218730CE22D003A9F2FF55205AACFC8A75A15D5ECD1576E628EEF74019C24605989C0317C5A5672CD8EFC27AC9D499EB32C<br>E8A0B4DADEBB8B943A8F5399CB35FF572D0ED1A82CD01604FAAB2F2AC8683E9CE8C9747AB62D6242F63012B9E3D080E4A6D81CAC474AE26BCD4EB271E33B<br>EB387F478EF0F92ADC8D6D45823A259F2CBE7CE643A8809698B2CEC467297DE8E1D5FC8170394CF22ED35BD902104B073A48D7EB6D36F4F36900C549E670<br>12239540D27458D3DF157172838E08C65750F17FA08B43F4504FA16CBBDD71E394354F8531785F90036506CB08B62F619AF9DAE4350270CF992624CBA405<br>ADAE91465F128F097A09B18807D31BEA4CFB4554100AE21B56B54BA6AFA8799A8EF58C5D1804629B1A5A03D5116535B93388A5D1606C9B8E899A260E495F<br>B879892BD5E3A021E8F592AE9D0874E2DA1FE1094A6FAEDC8F6CB19E81CD85F88C0F367B1FAA9B642986E3A634549C6AB84BE7FF9D8E476C9CFFE1C87509<br>AF805145AA30683E38F43EE28156D836C2A23EDDB746DCBF188DE680F2FA80140B07921DE520F803EE0D0968B8CA1DCC052CC6DE7D1264231554D3EC79FA<br>174F47C664153383ABD7219D5634</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion</a><br> * Note that this server is available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion<br> </a> 4. Start a chat and follow the further instructions. <br> <hr> <b>If you can not use the above link, use the email:</b><br> <a href="[email protected] ">[email protected] </a> <br> <a href="[email protected] ">[email protected] </a> <br> <p>* To contact us, create a new free email account on the site: <a href="https://protonmail.com">protonmail.com <br> <b> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Targets

    • Target

      medusa.exe

    • Size

      235KB

    • MD5

      f6f120d1262b88f79debb5d848ac7db9

    • SHA1

      1339282f9b2d2a41326daf3cf284ec2ae8f0f93c

    • SHA256

      1bc0575b3fc6486cb2510dac1ac6ae4889b94a955d3eade53d3ba3a92d133281

    • SHA512

      1067c1a73cf891d651fa007f4ccc4452f32801fe3859933ef1bcc00985e35ce016fa6c601c0e3c10df2080fc9b8a776b2f18d40bd64dfb98177ab638c4b545bd

    • SSDEEP

      6144:c5vMUmRTTgwnfeP+Jx1cLNAIyBcc9WrEWUC4wQh/6BeX:/U8Tgufnx1cLNncgQWUUQh/+e

    • MedusaLocker

      Ransomware with several variants first seen in September 2019.

    • MedusaLocker payload

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (192) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Renames multiple (199) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Renames multiple (222) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Renames multiple (281) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks