General

  • Target

    2120cf93b6be39884f951ee2a31c5999

  • Size

    669KB

  • Sample

    231231-ae97gadba8

  • MD5

    2120cf93b6be39884f951ee2a31c5999

  • SHA1

    317b695da0ece90979f0400c2c7800e50bec8bb9

  • SHA256

    c5bef2a489740192a0b2c34cdc2fd954d0b8d5fabcbe0ecb8b78f9301e5a30a6

  • SHA512

    3038b27dcc263675a642f77d9dbaaff921c3a56f160051df44619dbafcd5d108db1c6caeacb70179c511e284035d329f29c34dd19500d2bd4006d2f86ee1dc33

  • SSDEEP

    12288:dQA0FfTcwpBuV2UxqDmuiLZeUaoFi2XZWfGe615HhAZV8DKKD/KeX:Tuf4wTuV2Ux3uIZeUBi2Te6HWjKrKe

Malware Config

Extracted

Path

\Device\HarddiskVolume1\Boot\HOW_TO_RECOVER_DATA.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">DBAB6D4BB6CB08F4DBC07DEB304DF9070E16421000A965FADCF289C82B97FCC9E44DFE4C49A4E44811008DF23B1ED925672A1C2A9038C9A3A9A2248C61B980D5<br>F8CDE03508ADFF32F7A05400238FCF2C9E17D5CCBB0323C574D41474EDD9B09071FA94BD9496E4E7C37AFCABE2F6A955AD5365FC91968419068C4E819C46<br>9262FF434AF2D29F2EAFA76EDF835C837AC6870F32F67BA11E32799F7FDB52FD1C19312CFC6147E4E8BEEDC7C0E1C52F5EABAA2A0D466B815517A08B0A84<br>45B4E1314D660D6B5534E377D47929C1876269F85B92058B1755705DAA50A3549B6B2372CAD5B3ADE51684084D202AE025EA51CD02F05F352A5BDE58686C<br>E578B149341328C21781FBB6CD4EE36E5C7ED454023431972453F68B4F9DD5D8CD0AED6B341C4EF34702060AB963DFFC97C0113E384A0C79666015A59E05<br>D1581F4FE49A2A7B095DC7FBC0F329FF47D6A22E89D4E862B82A6CAE316844EB194706EB2EE5563A65D5AD3A4C6F8840C6AF6FA9C6EE45E5081836C7C21B<br>F91E2CF433855A2D45DC18CF4B6A2DF8962D3D56ACF13809C1EA9197AECBA9DB349F1690FFEB7D65A700313BB75A4CC47C16A4D6410CC47992E65205C7A1<br>9110407AF0088EC0102531219F0E1475813395B0A484F5C361952D62F887628924A4E59246BE1CFE6C46E1D4F986CA51FE43E9E3F839298DB80ADF8E93A8<br>DC02E0CDF4AFC94957EF9D00693B</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion</a><br> * Note that this server is available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion</a><br> 4. Start a chat and follow the further instructions. <br><br> <hr> <b>If you can not use the above link, use the email:</b><br> <a href="[email protected] ">[email protected] </a> <br><a href="[email protected]">[email protected]</a> <br> <b>* To contact us, create a new free email account on the site:</b> <a href="https://protonmail.com">protonmail.com<br> <hr> <b> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Extracted

Path

\Device\HarddiskVolume1\Boot\HOW_TO_RECOVER_DATA.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">62C26A98F87BA18F6B87CE78CAA89B017FB47B39408FCC01F8AA5D464D981722A5920EDED1B6E74C82AED6F544CE50E7440DE7E3F446B86A1A9050C7A08321C7<br>D92E5D6881C6472B1D7B782F992A1B6B3631045F16DB211EFBEE6CC11355D6725A34F2547F23296778D850AA056166DA2462C12E3D091CF18564149858D7<br>A1877A89F230BEF1CD48E292DDB9482F4318866202431F85E76B734E7A2DD4652A72201A5CD081320A45C8F3E288804846507F983987F638A53725CC1095<br>94C157C4852367359DE738CC46A3CB3E0486504856BF548981F5AE20C8E2D004A99F0EF02F93389EC4C8554909B21000E5B4230F53D4CEF390C7AC67E64C<br>5CAF0023236F8DEDC001AF698838C792A4CEC464F1C9AB32BDE40935B0A4F0B232A518A123DF7906F51B31C816882960DC8DE964990F594E77060D12C437<br>522E933BEEE34FE205ACFB64236AA0E63E2F48CF2D9380DA059ABB56A479B76D3590E0BBFB80159599F1F0E3BCB190F130CD58BD581B3A5374C38BE63845<br>42BC372D3428578DF35095A4253CED9FE525D7AB75A3E97E195C4EFE9935CC84FF014F3804855463967190E126F71E720B5821B77AB18AABD8A06D61DA22<br>527C96D1DF91A15FBE1ADFAFA991C882C35C6E943E1A267AB3F2651B941AD936A2A7592C57691F3A0EE7E979E55A894EBD72E56D0DF8657F68A12EF61C18<br>D70E20EF29558B1EC19D7E98B086</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion</a><br> * Note that this server is available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion</a><br> 4. Start a chat and follow the further instructions. <br><br> <hr> <b>If you can not use the above link, use the email:</b><br> <a href="[email protected] ">[email protected] </a> <br><a href="[email protected]">[email protected]</a> <br> <b>* To contact us, create a new free email account on the site:</b> <a href="https://protonmail.com">protonmail.com<br> <hr> <b> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Targets

    • Target

      2120cf93b6be39884f951ee2a31c5999

    • Size

      669KB

    • MD5

      2120cf93b6be39884f951ee2a31c5999

    • SHA1

      317b695da0ece90979f0400c2c7800e50bec8bb9

    • SHA256

      c5bef2a489740192a0b2c34cdc2fd954d0b8d5fabcbe0ecb8b78f9301e5a30a6

    • SHA512

      3038b27dcc263675a642f77d9dbaaff921c3a56f160051df44619dbafcd5d108db1c6caeacb70179c511e284035d329f29c34dd19500d2bd4006d2f86ee1dc33

    • SSDEEP

      12288:dQA0FfTcwpBuV2UxqDmuiLZeUaoFi2XZWfGe615HhAZV8DKKD/KeX:Tuf4wTuV2Ux3uIZeUBi2Te6HWjKrKe

    • MedusaLocker

      Ransomware with several variants first seen in September 2019.

    • MedusaLocker payload

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (333) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks