General

  • Target

    1658a064cb5a5681eee7ea82f92a2b7a14f70268dda3fc7aad8a610434711a8f

  • Size

    669KB

  • Sample

    240112-hyg9ssbdhn

  • MD5

    3618b68d7db4614ec8d33b5052cc0e85

  • SHA1

    15177fbb65d707b308bac50f612b795494314001

  • SHA256

    1658a064cb5a5681eee7ea82f92a2b7a14f70268dda3fc7aad8a610434711a8f

  • SHA512

    d6ab35314f9388cafc340edc4476f374faddf6b0905d736356be32fc3e77cb2baa09fedc13af5a43c10fb4631cc77e766b530e58fa47f98329e9e2371cdd7e8d

  • SSDEEP

    12288:dQA0FfTcwpBuV2UxqDmuiLZeUaoFi2XZWfGe615HhAZV8DHKD/KeX:Tuf4wTuV2Ux3uIZeUBi2Te6HWaKrKe

Malware Config

Extracted

Path

\Device\HarddiskVolume1\Boot\HOW_TO_RECOVER_DATA.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">68A49D8C424B4C38E61C3D829A03555D40D8E1823194C0C55ABDB55D7013F079ADAEF8F9F2731EBC1454B312EE512967E23A37F833E124604BB3B2D661783EEB<br>70DA7554832BC64B930910940CDD56F7D72E3F00D3409617BBF722CA3AD8FF181907E67F95680C04619B0F4AB4B90756DA7F70D6DCFA10E70352F3F9D737<br>D4A11398F4526E7DDFFB55CAF961D3595E0AA9327525D252776149A1A29D2FB96D5B5F202A8E14F83331ACFA69FFE0C26827C29B5DAA86085D94452B4CB5<br>668413BCD6C9F364B69FCD84959A8420F458ECEB2EFCD3EFCA87606C4ABD0312ACDB59DFB96AB359EFF90CB66ED70D4A369E4C198B5C5615F9C112F09E8C<br>05B19424E0699F0E31A997891837EE1C86685EDE8D2B7CA3FBE9648C3EBE891ADC7AE00D4C3FE482A77202DCAC7AE91F7067D2A5DB2BE3CD4A04C875576C<br>509C9E71C6891085398E69992C99A3AB8AFAEF52F2112CF8E29BCA786A2C52E40329166E50AE1420FE4F604AD42FE8FA8806045BB33238CF7C07726B1D40<br>E1234901F544F1AAA00ACB1D0335DC6F511669C15F38D8988BF64F2C2C9A02F5095920085EA5482643F9D4FC175DD971BC5ACF97C12E39A0B0C2D455D896<br>628F52C4073E40BF2DF982079097076B02573ED5F41FE1F63E26D0F46142E4CD0C2B5738CBCEC1B2EE980FEF21DFD76DAB47EC3D63A7E2CC9196C42955CE<br>5255C0A7C8B872017899723E653B</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion</a><br> * Note that this server is available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion<br> </a> 4. Start a chat and follow the further instructions. <br> <hr> <b>If you can not use the above link, use the email:</b><br> <a href="[email protected] ">[email protected] </a> <br> <a href="[email protected] ">[email protected] </a> <br> <p>* To contact us, create a new free email account on the site: <a href="https://protonmail.com">protonmail.com <br> <b> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Extracted

Path

\Device\HarddiskVolume1\Boot\HOW_TO_RECOVER_DATA.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">F5281541590A23A07EF8310951D71302DC0A2FC849D80D0A22E9551146D0012E4DB9061A7355D680B5D10446AC7A0A27000B4401E71396EA3C58E94C54E73C63<br>C9D9DE9CBCD6A3ED7592D565ABE7AE21AF9D5A44BFD7C5430CBDD349CD782A9F62407D7A28C6DB95B47FAB8413964266403ABDE4C976B792B618C2BBE182<br>2C8C7323BB6A832437CA19283D36AF6DC4B6256F441D36B02842990AAB889301E63941647C5F1A711991B5B9DDE7289B13CAFF36078EDB856AD0F6DA18FE<br>76E5DFA85A463FB33021B86953E8BE33CF8BA0B8B8B4696348F58D5E5B55B53D219613B678924E9AEA9E806BE9569E7313A77474569699E1A5CD902EA9AE<br>92D1435F14869F923FF7B1717FD2353EB6DE97E9B6DF01F169EB0662EBAAAB99FEB13D7D5E270EA7D111B42DAA4F015DE2D0E27DD377DE4A91DEE9EB89D0<br>1950B1BE3ED92D875868DEA4FF0A55178443C818D9D063966439ACC909463287D9B9111DAFA62A96F16F3C0EC947B3B2FF7F8BCDB8832A89F91FB6A45107<br>E9D34D189F405E02C885B6D35F49DD6B8EEE197D0CC3D7801836CD2668A2DABD74E158E7B8C6A1583E24276C898FCA18CA6B21D3A5CB9B90278B6D01B629<br>5B36468FFDA5B57EEDC8BB40E680641BA24C809CC61F0A824B3D37B53DB415191757856FB8BE0351850CB6BDC3A752F8C43DD55DC7A06584EE7B29DA8F76<br>030F1443EB86770CA0C699D73428</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion</a><br> * Note that this server is available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion<br> </a> 4. Start a chat and follow the further instructions. <br> <hr> <b>If you can not use the above link, use the email:</b><br> <a href="[email protected] ">[email protected] </a> <br> <a href="[email protected] ">[email protected] </a> <br> <p>* To contact us, create a new free email account on the site: <a href="https://protonmail.com">protonmail.com <br> <b> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Targets

    • Target

      1658a064cb5a5681eee7ea82f92a2b7a14f70268dda3fc7aad8a610434711a8f

    • Size

      669KB

    • MD5

      3618b68d7db4614ec8d33b5052cc0e85

    • SHA1

      15177fbb65d707b308bac50f612b795494314001

    • SHA256

      1658a064cb5a5681eee7ea82f92a2b7a14f70268dda3fc7aad8a610434711a8f

    • SHA512

      d6ab35314f9388cafc340edc4476f374faddf6b0905d736356be32fc3e77cb2baa09fedc13af5a43c10fb4631cc77e766b530e58fa47f98329e9e2371cdd7e8d

    • SSDEEP

      12288:dQA0FfTcwpBuV2UxqDmuiLZeUaoFi2XZWfGe615HhAZV8DHKD/KeX:Tuf4wTuV2Ux3uIZeUBi2Te6HWaKrKe

    • MedusaLocker

      Ransomware with several variants first seen in September 2019.

    • MedusaLocker payload

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (293) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks