Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
84b88ac81e4872ff3bf15c72f431d101.bin
-
Size
311KB
-
Sample
241214-bty87atrdk
-
MD5
b4df346509d53cb0bb455c8ee42ca340
-
SHA1
de92bf116504ade0b3e7a6b382c15b8888b49e0c
-
SHA256
eb467923791490891f69ab4ef7a2c3e01f77054d34fde717af9c14d2ea6dfe95
-
SHA512
1c5def683f382019e32374ede613889e26f3c563933b16ad3eb9c31931c2ce62b61ac4ac7a35af857c1d17f488bd2122ca5e288bf7e416220a82c1d34e2a54a3
-
SSDEEP
6144:QfsRcUMJ5YxbnW3e4j3lEnKLZT30cqxIFumX8jUyr8M4lM5u+X/jMx:QfsaWX4RGK9gvxIlX8jNQM4lK/C
Static task
static1
Behavioral task
behavioral1
Sample
4d4df87cf8d8551d836f67fbde4337863bac3ff6b5cb324675054ea023b12ab6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4d4df87cf8d8551d836f67fbde4337863bac3ff6b5cb324675054ea023b12ab6.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\$Recycle.Bin\!!!READ_ME_MEDUSA!!!.txt
http://medusaxko7jxtrojdkxo66j7ck4q5tgktf7uqsqyfry4ebnxlcbkccyd.onion/
http://medusakxxtp3uo7vusntvubnytaph4d3amxivbggl3hnhpk2nmus34yd.onion/227098164ef1fdb119ef537986bbdf24
Targets
-
-
Target
4d4df87cf8d8551d836f67fbde4337863bac3ff6b5cb324675054ea023b12ab6.exe
-
Size
624KB
-
MD5
84b88ac81e4872ff3bf15c72f431d101
-
SHA1
0823d067541de16325e5454a91b57262365a0705
-
SHA256
4d4df87cf8d8551d836f67fbde4337863bac3ff6b5cb324675054ea023b12ab6
-
SHA512
185691b0103669c5aa25b22c36f29ddb66f074e0f2e3ae6a36ed8917c35f1fba71fba65c11c3211ce64f6c5919ac879ce0fdcc4dddae420cbecf40711dff1860
-
SSDEEP
12288:V4eCA30wfnlxvaUwZNf6qYID7ZJuIQOsknZh20QyCkje0ZM7qgbGKTO7muYpralU:3C8valgsDyfSBKXyMUkW2LILGBm3IzPB
-
Medusa Ransomware
Ransomware first identified in 2022 that is distinct from the similarly named ransomware family MedusaLocker.
-
Medusaransomware family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (8526) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Windows Management Instrumentation
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Share Discovery
1Peripheral Device Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1