General
-
Target
recovery42.exe
-
Size
419KB
-
Sample
241026-varvjstpck
-
MD5
68e664c654bcf9d558fb7b4f8da1f28d
-
SHA1
9deb213f58e48725bcc7974460b5e22cc3866cc1
-
SHA256
cb03c1677c165261557f0710ddc2e39790acac48ef038c71358ab5ad4f366cca
-
SHA512
5099414230ceb6c2903085f83f0cd267d7d9362f3c591681979119e52add81c31b032d95f477f7dc503d25da10a9e486b430336a58289b8297e1d79d190ab596
-
SSDEEP
6144:4CmPvkrISw8ZMQsFMFEXmtT+n4CQi2oD9HoZwIYaTR/dXszI2lUC40:L3W6MoFlV+n4CQRoD9IygT/L+
Static task
static1
Behavioral task
behavioral1
Sample
recovery42.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
recovery42.exe
Resource
win11-20241023-en
Malware Config
Extracted
C:\USERS\PUBLIC\DESKTOP\HOW_TO_BACK_FILES.HTML
medusalocker
Targets
-
-
Target
recovery42.exe
-
Size
419KB
-
MD5
68e664c654bcf9d558fb7b4f8da1f28d
-
SHA1
9deb213f58e48725bcc7974460b5e22cc3866cc1
-
SHA256
cb03c1677c165261557f0710ddc2e39790acac48ef038c71358ab5ad4f366cca
-
SHA512
5099414230ceb6c2903085f83f0cd267d7d9362f3c591681979119e52add81c31b032d95f477f7dc503d25da10a9e486b430336a58289b8297e1d79d190ab596
-
SSDEEP
6144:4CmPvkrISw8ZMQsFMFEXmtT+n4CQi2oD9HoZwIYaTR/dXszI2lUC40:L3W6MoFlV+n4CQRoD9IygT/L+
-
Medusalocker family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Renames multiple (185) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
2