General
-
Target
2024-09-20_ed858a19f5881d5b4c1d291fc3c50bde_cobalt-strike_medusa-locker
-
Size
669KB
-
Sample
240920-xhdn1asbjh
-
MD5
ed858a19f5881d5b4c1d291fc3c50bde
-
SHA1
2becf1d3b743ecf638568065aeb631653f69d003
-
SHA256
f6e687b576ad52361379864e8065da6fb698df4ec6e0a1f664670229717eb230
-
SHA512
7c6c83e63ff207b4957b58f076304724007b0b886388f07142264f516dfcda1d12f73ec8e71bba0cce6ed6d2a31d055c61f5df4bb95442bef88e9c16f1c57906
-
SSDEEP
12288:dQA0FfTcwpBuV2UxqDmuiLZeUaoFi2XZWfGe615HhAZV8DOKD/KeX:Tuf4wTuV2Ux3uIZeUBi2Te6HWnKrKe
Behavioral task
behavioral1
Sample
2024-09-20_ed858a19f5881d5b4c1d291fc3c50bde_cobalt-strike_medusa-locker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-20_ed858a19f5881d5b4c1d291fc3c50bde_cobalt-strike_medusa-locker.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
\Device\HarddiskVolume1\Boot\HOW_TO_BACK_FILES.html
Extracted
\Device\HarddiskVolume1\HOW_TO_BACK_FILES.html
Targets
-
-
Target
2024-09-20_ed858a19f5881d5b4c1d291fc3c50bde_cobalt-strike_medusa-locker
-
Size
669KB
-
MD5
ed858a19f5881d5b4c1d291fc3c50bde
-
SHA1
2becf1d3b743ecf638568065aeb631653f69d003
-
SHA256
f6e687b576ad52361379864e8065da6fb698df4ec6e0a1f664670229717eb230
-
SHA512
7c6c83e63ff207b4957b58f076304724007b0b886388f07142264f516dfcda1d12f73ec8e71bba0cce6ed6d2a31d055c61f5df4bb95442bef88e9c16f1c57906
-
SSDEEP
12288:dQA0FfTcwpBuV2UxqDmuiLZeUaoFi2XZWfGe615HhAZV8DOKD/KeX:Tuf4wTuV2Ux3uIZeUBi2Te6HWnKrKe
-
MedusaLocker payload
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (327) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
2File Deletion
2Modify Registry
2