General

  • Target

    f8a9d3f458a7ab3af54cde87d2b0b4f6_JaffaCakes118

  • Size

    669KB

  • Sample

    240418-yqs94aef5x

  • MD5

    f8a9d3f458a7ab3af54cde87d2b0b4f6

  • SHA1

    9984cfbbf8c86c16d0ca2fd1388ed516213a6eb8

  • SHA256

    45f0bb5539b7ce29c74f11c46b1f1199eae518af04ff7bb499e10f4780dc7530

  • SHA512

    324b73a4fb223d653fb56f3d0081fdd4429ca222c43069141f6df4e53538b2dd25c0f25fad14d8c96e0bbbb5b9a7de6fc93b96695315a777aa5c065035b49dff

  • SSDEEP

    12288:dQA0FfTcwpBuV2UxqDmuiLZeUaoFi2XZWfGe615HhAZV8DYKD/KeX:Tuf4wTuV2Ux3uIZeUBi2Te6HWRKrKe

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\HOW_TO_RECOVER_DATA.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">F6DB4A4BFEF42F2434EC69D381E48F4BB7F4DDF3EB5C4C103A361EB8EF9C4E7A753FE61D29747FC97355BD5FCB174D7881F1BEF53256E6DDD26D3C016C6544CF<br>1384E018B6012223A032B805CCE6E4D68DA688761E1B6B687DAA66241A6FC466A305EB9315BDD7EBE9ABF6D51F26E5869945FAEE95668AB3C56404B16C15<br>A7E7EA2538A118389114CFD9B0A9BBB9DF3B9758B1E87721334F4ED408A91DDD673F7D817009EF0697C3CD1BAF3C1958973DB399F5DBA60B21B3A576DFF0<br>18849EE818D356BB2254D83DB21A05D82856B6CC47D408902F45C7FCB3482171801EA3407EC9AEFB3965A18155F678231879079B1D07945AFB50E291F55A<br>BACD1C6BC81705477BC29F76E5869360E3B27FDBB701D93B18DCBAE006FEC447DDDFFD7587E6EB8E377B116C7E658E25F4940FB0E012D4F48FE31AEB3519<br>DDEE052C3CFF569CF12C2DA5B5AE992904A7E4E29F6F2D2D35678C990A30931F204CB59732A00176C0B61180FEF97F34B94CA2C946A54863A97455775BE5<br>A18D615A12AF9686A838FB2B678D33B772357771004235D37E027F8E54A9EF139E6592794622B4E0181C729A3572F539F1A4CB409795651D350C840A9FA5<br>D70752D80CF69D90BCF6850A2A0437868C661128876E3C254AEAEF37E16D3917240742EAE25B31F6155DC98CE4653637728A9BF91E2EE7E839F92AC76BA2<br>688138130D5E0B912C98EB8DF173</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion</a><br> * Note that this server is available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion</a><br> 4. Start a chat and follow the further instructions. <br><br> <hr> <b>If you can not use the above link, use the email:</b><br> <a href="[email protected] ">[email protected] </a> <br><a href="[email protected]">[email protected]</a> <br> <b>* To contact us, create a new free email account on the site:</b> <a href="https://protonmail.com">protonmail.com<br> <hr> <b> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Extracted

Path

\Device\HarddiskVolume1\Boot\HOW_TO_RECOVER_DATA.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">FD1F749AC63049761F050617DCE41B03D0CB9468AE1A2F371F52269BC6C5A2AC4D8D7B8386A8436C6789456A9F345EB0EDF90B663392108CB07081DED95D321A<br>A3923DBDFCF96FBF4BEAD5EE337FAA41C0567C4F24F6A092865591476AAFC4ADD8918A84CE13B37099546DFE04E0C579D3F5D21D19AEE7824E3C11DCD01D<br>0D9CF28DE8EBD912263B810E52C065CCDE1176BF5FEB90FFCB2F1696681716E2CA7FD0FBCACDD9785ED5A024AE70EDA9F8576AC417C0B9EA21E9C3CEEBF0<br>429072BC5625C4AC1CCCD417251CF7BC4FE166F46F02FCC7EE11844B8DC07826D1B515549AA5764E7E621B35572753C652B44B3C851DEC5F5ECF8C78C9A8<br>0A4B9B58BF566D8AF22AD8344DBFB88A34CE77EA9A51F1E8F2E557DC6FC92C8E9C1933E04FED5FF411EE74C038A04FDFC1FF169B1E039FDD5F00EEB0B332<br>24D58ABA76E0C0F5962DC63B52B69F6D3E8798D833CE8D6ED24BB6060D1FB6C1B2BB035BE3B42E4D6BDF001E7BEF89BBB8A4CF89C9E2275F9ED05AE5EA29<br>27DB867546628051057682235590DB363FFE886A91896A20E38584372CB91F622346916EFABCF527C9B847F074682E300930BA2942AE237A6D9D97A70DE7<br>BC1638397E7797FB8CD87C628B9F8178771BF13B3552A6268C2E2CC05D1D49CE3B7B56D19A1A1A09D2028B33EAAC6FFF845CF3CC91AFFE5862FD057A08DD<br>80BA255AC49B5274AE921ED84415</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion</a><br> * Note that this server is available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion</a><br> 4. Start a chat and follow the further instructions. <br><br> <hr> <b>If you can not use the above link, use the email:</b><br> <a href="[email protected] ">[email protected] </a> <br><a href="[email protected]">[email protected]</a> <br> <b>* To contact us, create a new free email account on the site:</b> <a href="https://protonmail.com">protonmail.com<br> <hr> <b> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Targets

    • Target

      f8a9d3f458a7ab3af54cde87d2b0b4f6_JaffaCakes118

    • Size

      669KB

    • MD5

      f8a9d3f458a7ab3af54cde87d2b0b4f6

    • SHA1

      9984cfbbf8c86c16d0ca2fd1388ed516213a6eb8

    • SHA256

      45f0bb5539b7ce29c74f11c46b1f1199eae518af04ff7bb499e10f4780dc7530

    • SHA512

      324b73a4fb223d653fb56f3d0081fdd4429ca222c43069141f6df4e53538b2dd25c0f25fad14d8c96e0bbbb5b9a7de6fc93b96695315a777aa5c065035b49dff

    • SSDEEP

      12288:dQA0FfTcwpBuV2UxqDmuiLZeUaoFi2XZWfGe615HhAZV8DYKD/KeX:Tuf4wTuV2Ux3uIZeUBi2Te6HWRKrKe

    • MedusaLocker

      Ransomware with several variants first seen in September 2019.

    • MedusaLocker payload

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (282) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks