Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

20/10/2024, 16:44

241020-t88qaa1apq 10

19/10/2024, 21:15

241019-z37tpazakh 10

19/10/2024, 21:00

241019-ztk9bsydqd 10

General

  • Target

    b091e38b4cdf341c2733c6e8c2199afd4ee05fc9f921a37c8e555198f1ec2e12

  • Size

    624KB

  • Sample

    241019-ztk9bsydqd

  • MD5

    92a20ba91b4d3b89b57aa95a120667ae

  • SHA1

    5f45a26c898a2fad0da08a6c4ba626e52619a599

  • SHA256

    b091e38b4cdf341c2733c6e8c2199afd4ee05fc9f921a37c8e555198f1ec2e12

  • SHA512

    81c66376274649ad99a343b5bf15211c18615009bbf4c18cc4f6992ab64664c945333b781ac856ac1d0ae367a9fed2294516d2a372bd97ad9e9d01b68bf5ea09

  • SSDEEP

    12288:hd0aVXqKVXjdnMUs10XjzXQIGP0uNFoEKY8gMDidGPZ55jEPttS6tEVwuYlwIBl/:XC82SUs3cZVS/GWvfFnayWHD5ZHsjWPx

Malware Config

Extracted

Path

F:\!!!READ_ME_MEDUSA!!!.txt

Ransom Note
$$\ $$\ $$$$$$$$\ $$$$$$$\ $$\ $$\ $$$$$$\ $$$$$$\ $$$\ $$$ |$$ _____|$$ __$$\ $$ | $$ |$$ __$$\ $$ __$$\ $$$$\ $$$$ |$$ | $$ | $$ |$$ | $$ |$$ / \__|$$ / $$ | $$\$$\$$ $$ |$$$$$\ $$ | $$ |$$ | $$ |\$$$$$$\ $$$$$$$$ | $$ \$$$ $$ |$$ __| $$ | $$ |$$ | $$ | \____$$\ $$ __$$ | $$ |\$ /$$ |$$ | $$ | $$ |$$ | $$ |$$\ $$ |$$ | $$ | $$ | \_/ $$ |$$$$$$$$\ $$$$$$$ |\$$$$$$ |\$$$$$$ |$$ | $$ | \__| \__|\________|\_______/ \______/ \______/ \__| \__| -----------------------------[ Hello, Globes !!! ]-------------------------- Sorry to interrupt your busy business. WHAT HAPPEND? ------------------------------------------------------------ 1. We have PENETRATE your network and COPIED data. We have penetrated your entire network and researched all about your data. And we have copied all of your confidential data and uploaded to private storage. * You're running a highly valued finance news business and your data was very crucial. 2. We have ENCRYPTED your files. While you are reading this message, it means your files and data has been ENCRYPTED by world's strongest ransomware. Your files have encrypted with new military-grade encryption algorithm and you can not decrypt your files. But don't worry, we can decrypt your files. There is only one possible way to get back your computers and servers, keep your privacy safe - CONTACT us via LIVE CHAT and pay for the special MEDUSA DECRYPTOR and DECRYPTION KEYs. This MEDUSA DECRYPTOR will restore your entire network within less than 1 business day. WHAT GUARANTEES? --------------------------------------------------------------- We can post all of your critial data to the public and send emails to your competitors. We have professional OSINTs and media team for leak data to telegram, facebook, twitter channels and top news websites. You can easily search about us. You can suffer significant problems due to disastrous consequences, leading to loss of valuable intellectual property and other sensitive information, costly incident response efforts, information misuse/abuse, loss of customer trust, brand and reputational damage, and legal and regulatory issues. After paying for the data breach and decryption, we guarantee that your data will never be leaked and make everything silent, this is also for our reputation. YOU should be AWARE! --------------------------------------------------------------- We will speak only with an authorized person. It can be the CEO, top management etc. In case you ar not such a person - DON'T CONTACT US! Your decisions and action can result in serious harm to your company! Inform your supervisors and stay calm! If you do not contact us within 2 days, We will start publish your case to our official blog and everybody will start notice your incident! --------------------[ Telegram channel ]-------------------- https://t.me/+yXOcSjVjI9tjM2E0 --------------------[ Official blog tor address ]-------------------- Using TOR Browser(https://www.torproject.org/download/): http://cx5u7zxbvrfyoj6ughw76oa264ucuuizmmzypwum6ear7pct4yc723qd.onion/ http://xfv4jzckytb4g3ckwemcny3ihv4i5p4lqzdpi624cxisu35my5fwi5qd.onion/ http://qxssgdmzli5kazyimrz3ktra5knhialjrdf4edxnwqsokgvrwjqu7cqd.onion/ http://62foekhv5humjrfwjdyd2dgextpbf5i7obguhwvfoghmu3nxpkmxlcid.onion/ CONTACT US! ----------------------[ Your company live chat address ]--------------------------- Using TOR Browser(https://www.torproject.org/download/): http://uyku4o2yg34ekvjtszg6gu7cvjzm6hyszhtu7c55iyuzhpr4k5knewyd.onion/43238f023e96b71e5abb8bc0fc2cd2ab Backup Mirrors: http://5ar4vuckm3k7osdlzskqkaqmqr4jjpmdikuotmlpkrbsxx7ard3xetyd.onion/43238f023e96b71e5abb8bc0fc2cd2ab --------------------[ Or Use Tox Chat Program(https://utox.org/uTox_win64.exe) ]-------------------- Add user with our tox ID : 20A32ABC1E4EC6D53861D7202E730501EE5E950EB1FE96A0CADB7C231F44C959DE81A8515C8C Our support email: ( [email protected] ) Company identification hash: 3e821489e358bfb678fb8a4515e811cfa0f858e29fcddb2bc25b0ef233fbbd3b
URLs

https://t.me/+yXOcSjVjI9tjM2E0

http://cx5u7zxbvrfyoj6ughw76oa264ucuuizmmzypwum6ear7pct4yc723qd.onion/

http://xfv4jzckytb4g3ckwemcny3ihv4i5p4lqzdpi624cxisu35my5fwi5qd.onion/

http://qxssgdmzli5kazyimrz3ktra5knhialjrdf4edxnwqsokgvrwjqu7cqd.onion/

http://62foekhv5humjrfwjdyd2dgextpbf5i7obguhwvfoghmu3nxpkmxlcid.onion/

http://uyku4o2yg34ekvjtszg6gu7cvjzm6hyszhtu7c55iyuzhpr4k5knewyd.onion/43238f023e96b71e5abb8bc0fc2cd2ab

http://5ar4vuckm3k7osdlzskqkaqmqr4jjpmdikuotmlpkrbsxx7ard3xetyd.onion/43238f023e96b71e5abb8bc0fc2cd2ab

Targets

    • Target

      b091e38b4cdf341c2733c6e8c2199afd4ee05fc9f921a37c8e555198f1ec2e12

    • Size

      624KB

    • MD5

      92a20ba91b4d3b89b57aa95a120667ae

    • SHA1

      5f45a26c898a2fad0da08a6c4ba626e52619a599

    • SHA256

      b091e38b4cdf341c2733c6e8c2199afd4ee05fc9f921a37c8e555198f1ec2e12

    • SHA512

      81c66376274649ad99a343b5bf15211c18615009bbf4c18cc4f6992ab64664c945333b781ac856ac1d0ae367a9fed2294516d2a372bd97ad9e9d01b68bf5ea09

    • SSDEEP

      12288:hd0aVXqKVXjdnMUs10XjzXQIGP0uNFoEKY8gMDidGPZ55jEPttS6tEVwuYlwIBl/:XC82SUs3cZVS/GWvfFnayWHD5ZHsjWPx

    • Medusa Ransomware

      Ransomware first identified in 2022 that is distinct from the similarly named ransomware family MedusaLocker.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (8841) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Network Share Discovery

      Attempt to gather information on host network.

MITRE ATT&CK Enterprise v15

Tasks