General

  • Target

    JaffaCakes118_45c46ce6e6c549d90e06f1ab9722e01a075153dd6b667c0e716d37bf10fe05ea

  • Size

    300KB

  • Sample

    241222-grthtaxjhj

  • MD5

    cb9b02262dd099c2be852f80b612d9df

  • SHA1

    7023a0b5d68d80b1bae3cf17745b6d3a1a830bbb

  • SHA256

    45c46ce6e6c549d90e06f1ab9722e01a075153dd6b667c0e716d37bf10fe05ea

  • SHA512

    33c53c1b81645043e6d54ccc92569fa2b7585228bcda13432b599bbaf74879d141cee50a6cef31317918ff669cd220d5831e57fe60e3b9bc2508eef012efad7f

  • SSDEEP

    6144:9sgET/FMKlMEuBZaxAs+NEUNIJ5hY9/6CCS5nIFVyc9pnlWV5KeQKQ/DYiTs26Ju:9sDFllMNZaxAs+L3GS5IFD9pn8vKeQKs

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\HOW_TO_RECOVER_DATA.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">CE41AB83A698B125083605A4E6858E8A4AFADEA9D9BB75E2617503994CCD0AD38BF07B6C1DF0CAECB440C5DABA532DA45F5D578890D9969B95D452CA842E8548<br>8BDC7B74AA60F4B758128E36793B0E6CDA7DA584D6C77C31013A5FD7FC00339BF4AB80EDD1A4C1CE16578D2B7A61B5730D8F3CD24EA6EC7F2229DA102816<br>A946F0EC76FC192E3C07AC64FEA9EE84A7BBC3040F9586F2E0237B46CE5C29C8132CAC0830DD7D035F14269CCB19F73838026022F6662030820C81B59852<br>9A836C1560C5DDB3B412E4706B59719AA770C402CE5A3486CFFFF153CAA99B1EEE99EB131FCBCBBB407D373C63FA8C4AAFD3ED6EE63B51D3A69F852EEA16<br>D2C8F6AFBC8EA638794538A539EAFAAB74226998CEB4B29DD815CE6CC5C68F2914162F66C3D1F820C79BB389D1311FB35823FC58229224D13F191A12F0D7<br>8FA55F5DFCCDD8261E611FCAF159BC7F0ADF051B18C301DD1AB34325808435477AF1A102BBB4D256553CC0C61B1C84737A06D301C5E337C235763EB776DC<br>D0F5BC0C297FFB837F5650B3538133571123ADDAFC35D901AF99000CA71BD3BB3B6300C1E9D1BF4F7DF759E3A72B50B004042511B6B4195270CD2FF59902<br>753A1D58624310FEB40B1247226DFBAF65BB1DDB7AFD5208F902DF72DEC398CAF9F096EE6965D532E4B8C97F2C2675720CE1D08D3000F9ECE3510A99A351<br>E127B93525CFD3801A9E1776B54C</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <a>.onion</a><br> * Note that this server is available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open <a>.onion<br> </a> 4. Start a chat and follow the further instructions. <br> <hr> <b>If you can not use the above link, use the email:</b><br> <a href="[email protected] ">[email protected] </a> <br> <a href="[email protected] ">[email protected] </a> <br> <p>* To contact us, create a new free email account on the site: <a href="https://protonmail.com">protonmail.com <br> <b> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Extracted

Path

\Device\HarddiskVolume1\HOW_TO_RECOVER_DATA.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">3F85C0ABD86DD7BB78CB594B141F00FA15414B23D1D1DAEE538D67F2D4D210C112C033013E684E8951D2849D281A4645F8EAA839925FA8A3DCCDD7B5DAACF30F<br>6E198A3D7998928A9CE2A28ADB497DABD189AD4F2D617A86A93943BC8E3E54AF8F6ABEB60ABD6F03F461003ADFDC29AEF59A075A85514AFB28F39E1135D7<br>7F779B495474E6FC518B806C10130A7361959A9F77F4FF89D027E2C98E8E8ECF3ED63B4DB9C378479E6C230B506EF23A8F365A7BC3ADC689534BC1F67DA4<br>A89E08B3A42A61CDB7099102E9856E1B6D42E0E7607437504D49EF810B20D64D960EF5635CEF61E210540DB00063379A95274092493B061814B18D6A3FDE<br>C363F6F83362DBF2FEA47B88C9B3C634501B8E8C5AB56A547BE7F5A831F6F898574E6BDE0AE19FCCC7E84FBC4444429CA034641E922997178B3BE9A5D149<br>C6268B069F139AF421BC1BB9FAF924F14D51B8FC0F370F2561209D043EBBA85C4DB6AC290272DE79D49CA6CDD2EA867F6974D366F4FDD14744B2DC3B29F1<br>637ADCC70EAD2375A2F60687714FB20989B1608E89EAE245756DC513B729CE8931052A765F9D4B94817F868BFB3E399034A9E88895DD001736A6E24C6030<br>B75873C611CD4D81CBCC4F2AFA77E1BDEE4E98D24CC709572240A69FDEE8A6E22E3FAB41135F6F044312815EB3C86C8C30C2A91684CC0208954131420435<br>FCC62E3E8166026F0E07C709EC48</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <a>.onion</a><br> * Note that this server is available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open <a>.onion<br> </a> 4. Start a chat and follow the further instructions. <br> <hr> <b>If you can not use the above link, use the email:</b><br> <a href="[email protected] ">[email protected] </a> <br> <a href="[email protected] ">[email protected] </a> <br> <p>* To contact us, create a new free email account on the site: <a href="https://protonmail.com">protonmail.com <br> <b> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Targets

    • Target

      46c9bed88ac58193eb8c1b2ca91cfede01a74dafa4315ff57b7d3bb0c8a779cd

    • Size

      669KB

    • MD5

      f3f4909771e23ec301ae2a2c5945f25c

    • SHA1

      0cbbc30d64966d7108f3404979058285d8ed250c

    • SHA256

      46c9bed88ac58193eb8c1b2ca91cfede01a74dafa4315ff57b7d3bb0c8a779cd

    • SHA512

      fd928762c0ddc8301092504874b0ff4ad81a65c4cd385a493db2a5dcce786bcb2f915869958a6618ba10ac443ac6af6a458fed5ec2aedc52e0c649d9d72c27ad

    • SSDEEP

      12288:dQA0FfTcwpBuV2UxqDmuiLZeUaoFi2XZWfGe615HhAZV8DEKD/KeX:Tuf4wTuV2Ux3uIZeUBi2Te6HWxKrKe

    • MedusaLocker

      Ransomware with several variants first seen in September 2019.

    • MedusaLocker payload

    • Medusalocker family

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (328) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks