General
-
Target
1bc0575b3fc6486cb2510dac1ac6ae4889b94a955d3eade53d3ba3a92d133281.zip
-
Size
231KB
-
Sample
240718-l12m1atcmq
-
MD5
c619d1b49a183011ea3dc99347aaa77f
-
SHA1
271e7714874f2577fcda702c19b42e3471094a1e
-
SHA256
6f768b5db1b4c7ec2df1a8d012814e8903b0a1f0b1d3b7bdfff447a2cd24a281
-
SHA512
b717f2b06314826a15783786af2da26eb3d9e8598854535a0567d66b9227b3a0db7234e7eec58add7d078de6f5f3d91169a2612ea0a6e23deebe52904475ba09
-
SSDEEP
6144:BjVD0s8mf31trSqSgdRF7Kt5CIWR0XYI6r4J7V0zqO5x69:BRDhhteXgs5i4Jh0zbj69
Behavioral task
behavioral1
Sample
1bc0575b3fc6486cb2510dac1ac6ae4889b94a955d3eade53d3ba3a92d133281.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1bc0575b3fc6486cb2510dac1ac6ae4889b94a955d3eade53d3ba3a92d133281.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
out.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
out.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\HOW_TO_RECOVER_DATA.html
Extracted
\Device\HarddiskVolume1\HOW_TO_RECOVER_DATA.html
Targets
-
-
Target
1bc0575b3fc6486cb2510dac1ac6ae4889b94a955d3eade53d3ba3a92d133281.exe
-
Size
235KB
-
MD5
f6f120d1262b88f79debb5d848ac7db9
-
SHA1
1339282f9b2d2a41326daf3cf284ec2ae8f0f93c
-
SHA256
1bc0575b3fc6486cb2510dac1ac6ae4889b94a955d3eade53d3ba3a92d133281
-
SHA512
1067c1a73cf891d651fa007f4ccc4452f32801fe3859933ef1bcc00985e35ce016fa6c601c0e3c10df2080fc9b8a776b2f18d40bd64dfb98177ab638c4b545bd
-
SSDEEP
6144:c5vMUmRTTgwnfeP+Jx1cLNAIyBcc9WrEWUC4wQh/6BeX:/U8Tgufnx1cLNncgQWUUQh/+e
-
MedusaLocker payload
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (283) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
-
-
Target
out.upx
-
Size
669KB
-
MD5
3f002221f0a15187df187cb222d0cb6b
-
SHA1
0fa815635807c05c2f0e85f0f09362a8e90d1324
-
SHA256
ae00ad8ba6abc6ddac815187f1285cba597d0af8fa4d5ffe429bffb3b6140b5b
-
SHA512
08bab72bb09b96685f949845858cbaa4f709f7069971ad1f36849cd3f8fde699c1a2d1c0ae5ee397d57057c81c98f6be41c64caaa5e9435d92e10fa1623660d5
-
SSDEEP
12288:gQA0FfTcwpBuV2UxqDmuiLZeUaoFi2XZWfGe615HhAZV8DdI:Muf4wTuV2Ux3uIZeUBi2Te6HW4I
Score1/10 -
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
2File Deletion
2Modify Registry
2