General

  • Target

    JaffaCakes118_34601e5edf184f46c37314559e0a361cbce3aadc451e09f8b84020232fa710ad

  • Size

    1.1MB

  • Sample

    241224-qhhjmayjbt

  • MD5

    05bda4bb2537515927645759f4492004

  • SHA1

    fe892cd96ac631a15b9cbc93acfee9bb857ff4c5

  • SHA256

    34601e5edf184f46c37314559e0a361cbce3aadc451e09f8b84020232fa710ad

  • SHA512

    b0e5708bf3c9fdc7cbb137985f6766b2c654de790fc909d0785a94101640dcd1628414b9fc71f58682ebd4a8736358b6218a1597be57bd27595e48e54dee9b29

  • SSDEEP

    24576:k4m40zvnr/4m40zvLZ4m40zvXkg94m40zvLH:k4mTzvnr/4mTzvLZ4mTzv0g94mTzvLH

Malware Config

Extracted

Path

\Device\HarddiskVolume1\Boot\HOW_TO_RECOVER_DATA.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">9704D2A0AC40C19BC6CC5CFF9A04E8C14666001A62A99A29922AAE8AB7731D8616A1D9DA709960BD82E42681D32BD3938C23E7D8C9AC17293A132051DBE55D4D<br>1DC4B7C82A24247C69D635642197EF4ED81DD65D4E89553139F2B1A954987F038BA68DB065CB6B99AE7EEE4638A4B6BBC16A665C47440286CA422653F446<br>C68E792D61622AA940A1ABDC491F0A98975005BFA489C7D4A4F98E87A93C4F2D97B946B8CF6E2580EDF3C3DF4B6C88AB2C588133B140172D1F78020D32B7<br>570A0D5230CE985A97DC0E26B52E8F1CE93F5766CD2016A3D88F73749F4BF0230A31CF143D87E9BE7A73DD52A5E65165AC1054AA4BEE49CBAFE11F7E6B1F<br>8F8045D12B646FE1833DE28D098123641ED3A8D31BA4A2F6ECE480B2057BC0A3EBE4A5A7CD199F5A5315F9D6CDC8AEEBE5619843E604308B850AC687DE0B<br>C6985028EAE58889BC2467E3542489AC7ED58EDD34488A10BA9C1214F4980703D1B5DE167FA8BE11088DBB5CD395A2E3D7FE9490BA036381385181A7AED5<br>B831446ACC0016ACDE76EACA41CD793807A9E3393DD48ECFA7992D7B5B7F097EEFF92D79C8C66FBAAA965CB8165B03627FA74D6CF88F4018EFCA99F8954A<br>750AC5325F80E34730B8E42EA6D1366DDB6F94E87D03B6F6693E038B14CA5DCF189F3A07FC86049029328CF130F65427BDBB8F3A8EA97BFBE5850C97BC91<br>41CE6B18EB6367F40839B356A12A</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <a>.onion</a><br> * Note that this server is available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open <a>.onion </a><br> 4. Start a chat and follow the further instructions. <br><br> <hr> <b>If you can not use the above link, use the email:</b><br> <a href="[email protected] ">[email protected] </a> <br><a href="[email protected]">[email protected]</a> <br> <b>* To contact us, create a new free email account on the site:</b> <a href="https://protonmail.com">protonmail.com<br> <hr> <b> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Extracted

Path

\Device\HarddiskVolume1\HOW_TO_RECOVER_DATA.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">87169664D9D89C71B728C63CBF7F21DE47DD4EA9B5911E82E2E5A207CA48D1216E7784F065BD3E61A12D65EBE13410864138C52AD17F4FDF195931F1DB27814B<br>5DE74B5976DE4EDDCB695C059A807744F72947D643322387658D193B054EE40CCD9828FF11A86C581A336181F21949CB7089D92C3F2CEF8C6668F42B7B9C<br>575CFE0B4B4015E10B4AEE38C7F9525FE4C9058ADFD283F67D0523226A88853F0C70C4B5470EB1EF7A1509A2D6A5738F0BA2D066022027B5F8DEC3BD49D3<br>DBB64B20F8BE71521204065AC8807CBA67AF8A5C288CBBEDD4C160FE469A1AB8BD7338C26F060CC03E5A4E3381ACDBD8EEFF075870E68C6C1646A3ADBFB7<br>18DCB6E803202FCEF1DE53DF94354DA4DC14553106B97049F5550F75A13204BCEBE7FE05CE3D8E5B17A27C6C59E27124F6DC97E956BC6293B99642367A43<br>0AD91A7F6E405B68BF65A9797334B07F7C25FE723A648178E02D6464C43B3300764E4F91EEDA6FE923EC29BF44CF885CA979599204181E7A736EB1006502<br>AA61FC3C626B6739327F6A35456E64FAD5B2CB5AFB8AF012D4F906EF5619933471DF7771F8A7F4EB6E8034D5D6946A52F70DCACBCFE684400A5EDABA9515<br>4666BAB81A3293228A6FE5D2FAD377BE86C9F6B83179FE518AADED33C2EC866106C47864F133D2CD87C9D5BCEA517CE1395495E82372FB35D541678522A4<br>24B4D3F019B160BD72A0E0013C2E</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <a>.onion</a><br> * Note that this server is available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open <a>.onion </a><br> 4. Start a chat and follow the further instructions. <br><br> <hr> <b>If you can not use the above link, use the email:</b><br> <a href="[email protected] ">[email protected] </a> <br><a href="[email protected]">[email protected]</a> <br> <b>* To contact us, create a new free email account on the site:</b> <a href="https://protonmail.com">protonmail.com<br> <hr> <b> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Extracted

Path

\Device\HarddiskVolume1\Boot\HOW_TO_RECOVER_DATA.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">9B69C85A18E86C0089BEB59F5164497EFAC6A202CAE0BA94600DF8F21E6C52D882AF592E41AB4E7BA45526B4783969FE2E8AE85CC06EA9E19AB118EA6F2244F4<br>374BD8FCBA86F4A992DFFE6CE16AB6BF96A23AFF538C0160607E7E645B47D67770CB1DDC2C291DDE7E9C0CB4075EBAB1AF777DB2FFECA3251CE213C143B2<br>7D6244ABF648514F98EC9CCE941599944990A919D5973378E70C34700202F90B9D2BBFED100741F4E97091297788B0E097A404084B73A618374F72C0A304<br>5F86BF5E4769790B8D1FC20FD3BDDE05CC234987C751E2EB8661AC4E97771D380585CF74BB90F69B509DF877D15539B8806A3C8EAE49C1B5E5D44C4AF2EE<br>93C8FCAC638CFEE0132A4211E88BBA7E3902E3B786E040503F3DC9257529351A5A624C57B535F57CC7DB3F5EAA5EA6AEDBBA3EC05C6D539ACA558AE564C4<br>088C5A19D43D5086255A2334C4FEBA4CD1AED22D4D0FE6A18F42BA83FAD4461EE64FFCAA7ECF9ECF72C28DE02DBA1BF4068C21BEA048C0F538B0FE82ED1D<br>A8CC8FA2F9943F5F870520297FC96403D11F78228DDDA31978659B400E3667B676DA19758AFF966C61EBF50E555400881053757D19030463C7DE0737E79D<br>E05DE39F23DC312BD65425868CA803A72DEFFBAB2189CAA9CE3770DF3C8D20A5ECB0921DFD99B17C0006CABAB566CA234AC18D63ADB9EF4C7A3BE534F4D1<br>71199E28D65DB02C515B3513B17D</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion</a><br> * Note that this server is available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion </a><br> 4. Start a chat and follow the further instructions. <br><br> <hr> <b>If you can not use the above link, use the email:</b><br> <a href="[email protected] ">[email protected] </a> <br><a href="[email protected]">[email protected]</a> <br> <b>* To contact us, create a new free email account on the site:</b> <a href="https://protonmail.com">protonmail.com<br> <hr> <b> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Extracted

Path

\Device\HarddiskVolume1\HOW_TO_RECOVER_DATA.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">EB5B63A631414E4DF82EF2CC6DA38200C4FAED6AF20ECA31D46356722F6802C1999FC31D6688D612BACDAF76EAA0508CCC9A825587044BD24D32E0D316AC61E2<br>473F12DF05C18750A607AE741567ED446AF036A3B28C72F9816C61EBB96E09BA06491E16BD5A110585BF568E6722825536521893E977F58A2BCFF224C057<br>5AECF1A370776087771AC65B1FA684021C92BB40B657276D8E864AEF3A2D956A0992B80FF07DB1EF3D63619F770538E8B4EF476AC399DD09840D06220E4F<br>E11B9EECCC19B8E3296BD16A039303158D08C95EFE82D80BCD30F0332E27B904F1CA11131212306529CD9751808E836C211836828859CA7E0512096B73A7<br>DC8C56AB2AA10541E4F36800654281FA57F8115DDFDB0584BC49FE66C2EEC357E00D224878082D9ABD4A2429F15EC87EB145F7746901F44906287C05B53C<br>0098738BD62A625DEEFB7656AEF5EEDDF46AF80A1D41793254EF41C165F03B95612408E149C47DF4A68605EE03DC3F5FD8486E0B19FACDE41466E904F080<br>11285A02A62551504FF57B329134E23A670EDD36A5926DBAA63B2F0274431BA7ED36F1376A632C3C3BC8B136E51A831BD91E448E602A8B206EE054C670BA<br>ACC023968C20AE88845B13AA6C2C2E7FF211FBE58DF5DDC6A98F885383F27058C78983152AD78FC1473C9D0CE1A3AE36AFCE049F91C292901F047E896243<br>A02BFD948C569F58D6EEB7865C50</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion</a><br> * Note that this server is available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion </a><br> 4. Start a chat and follow the further instructions. <br><br> <hr> <b>If you can not use the above link, use the email:</b><br> <a href="[email protected] ">[email protected] </a> <br><a href="[email protected]">[email protected]</a> <br> <b>* To contact us, create a new free email account on the site:</b> <a href="https://protonmail.com">protonmail.com<br> <hr> <b> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Extracted

Path

C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\HOW_TO_RECOVER_DATA.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">E7D77B3AF89C29998F8CC439C1AB4866F653D9BA7838563A9B36738E3226C7C0CC0F432865D0F9CCB1931CE7D3DBE930E741E0A0D45E30ABD8861AF701DA92CF<br>5E95F699E95BEED46C6BE217B8991576496D40AB3319D9C5CA3BEAFD5A7B2EA1F1A91A089E1B72A82CE8CA41526F892DE65D92FCCEBBF51F842CE7DD50A0<br>C3ED1BFDF1A2C01EF5AE1024DE5FD89790D853209595EDCACE91DBFFD065350D041E2743CEBF467BF9CF09CCF516A1FC3C48C71930855EAABAF85389A0C3<br>34AA9AF91293AAB8BF439CD65500D7EED52396F8E350A839E4F693AC258F68D39A51E6D55F8E0305768DEC4864CDE68A6DB41C2553219E04B033C0CE24D1<br>CDC0FC10FC2CE0C43210C163BB155A1E2820CE44EC3F6C378CF9EB4B3332303646874675DBA508EB11D0BD9279070890FCD3D6E4FA959A00ECE323227A99<br>714E77280112B7E7AC9063819148BA8C126FB8049BEE7D027D1ED913D5BB653F2E04DE5D9176AF53281BF1DF552F5D0EF4A3F0BF79DB14DAEC71923A3694<br>F5A6A1F7A124B01274A950FA05514D267E410AF49A680D6B0668DED5225680B8B22566C38044C966E634E206E4C093BCF13227E4E599892ED1A0452812DC<br>DB0D9B7534CEDF3C0832766C73923006C2F2B228696A01210773542D54850E3FD22B5280E934B825A5FB4588C57916CDD162B67C6FE8B7FD220FF4DE2263<br>24DE40894BA2542F05C137368389</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <a>.onion</a><br> * Note that this server is available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open <a>.onion </a><br> 4. Start a chat and follow the further instructions. <br><br> <hr> <b>If you can not use the above link, use the email:</b><br> <a href="[email protected] ">[email protected] </a> <br><a href="[email protected]">[email protected]</a> <br> <b>* To contact us, create a new free email account on the site:</b> <a href="https://protonmail.com">protonmail.com<br> <hr> <b> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Extracted

Path

\Device\HarddiskVolume1\HOW_TO_RECOVER_DATA.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">107178C5D51A337148646C45D061AB3BB51C9E44D215CD7B57F465D1516ADEA43B79BC668B63EAED835D8403B46DC9ED843DEF7E8E2BB2DCF24B365B9C39AF19<br>C43EBC271A3F44B653FBC2FD45BD5B1E40F0B3B7F1D75080AC410043B5579DF8BB52EFD8D1B2A308ACBB93F1FB5AFC374B1745FEE4E24DC456BABC829C6A<br>C3969A1835593310BC0F05F570E36002ECF7604A81F6F45CA49C355172B0A6C101DC645FC18F4A1A68A896CD29661EB7E70A439E3628EBC99B114084809D<br>EC6F69859B5BE938976119D8867A9A2CF3BE48448E4070072A7648A8480FB37E0F7773CF3F8FD7BFBD1F7AD21DD2BE85074DEE603B166EBD3C611655BE14<br>DE2C68622F15C15CF77FE23B2DA838A6C4562937989F3B7EC0643664E085250D3601070766A298CF1A36923D8E41F9A1B073CD6FAF1FA0981CDBAF463EB9<br>AA4992D630BB67DCDB072AA75CE0A5EAE6C9630F5A7B7EFE5CBA9918A9A3A084CAFD671A116EA82D6F8253922DFCB8E54268E5EF76E756958E72C7ECC618<br>68079F9520BB302E3E8813DC1D2DF8F49041BDD39233523234B4ED59BD5FEDA925A5F422851A24D7144226C31FC3F5C97F19ECCB150A70F01FA65D7542C8<br>749EA38B4F7AF74425FEBB1B1FE1AE78A430FDA2F6DF7A3F1DB4D85497C00F2BB464D37E68402ED2101348F3F4CAECBC0E7470EC493ADA36624491A4F89D<br>5B8EA296216EE1B1338A9B353A7C</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <a>.onion</a><br> * Note that this server is available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open <a>.onion </a><br> 4. Start a chat and follow the further instructions. <br><br> <hr> <b>If you can not use the above link, use the email:</b><br> <a href="[email protected] ">[email protected] </a> <br><a href="[email protected]">[email protected]</a> <br> <b>* To contact us, create a new free email account on the site:</b> <a href="https://protonmail.com">protonmail.com<br> <hr> <b> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Extracted

Path

\Device\HarddiskVolume1\Boot\HOW_TO_RECOVER_DATA.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">64FB539BA67EA38FA43DCAF3D03343FEC2D1CC8201493541C2A047A7301B39F33939674FCD93E6D4FA32BEF917894187035F70415F4BBF37590FF3FEE0056937<br>52DAA311DC039419EB1BD6DE3C0EDB4E933A578C3550B5F3B6EC9A95E8B8051870602C0B34BA5E7C3145E05AF0CDDA305FED7D2EBA1B1BF79BD4D17C05D8<br>005F5B552F69821C2FAB82BE56FAB00F97274213824C9EA62941F09AC22B38AED6854D497558E684009ACF993AD34BACD72A3CAA653D6E02B05FFB6EC208<br>6CCFA4D3B95A361B6FC1CF246CFC7F644DE1A8414A0C73D550230AC0CD39EC28ED5C7E5B254073FE4F17CD476EB3BFD59E9B0822DFA9D86F0B6BDC709E9E<br>CA47FDD419A146ED8A6BE0793DB23BFDF13BA87F72EA0CF1A4A8AAB921F93D37CA0565C215E099E0E171FD908F1FDE8DD0B1F64FA3CE38C6037E004F9C81<br>2146DDD255CC966178C88A774462282E1ECE0D9617C61419843024ADEF835D64D7153C77996E1F0BD818F7176EBB86634CA17C54B0E5E231B448E2F9D32F<br>BAE9060B6E3CF2CBF0DB159398F46321797984E86085E590EFE382AB12B219293B1E0F735C7400139E6B4F6CD5F3770D1165D06ADAC740AB2E81DAA72562<br>B1C07E5810BA6D94A4C22DCE5A91B363F3FB44B767B54D928700D07B725A426D059C75F678623C2281FCE0D5479AEF01E7DF350A5A8E8F11F6CEC655547E<br>F14DF0FB68398A76FB7C77AE5270</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <a>.onion</a><br> * Note that this server is available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion </a><br> 4. Start a chat and follow the further instructions. <br><br> <hr> <b>If you can not use the above link, use the email:</b><br> <a href="[email protected] ">[email protected] </a> <br><a href="[email protected]">[email protected]</a> <br> <b>* To contact us, create a new free email account on the site:</b> <a href="https://protonmail.com">protonmail.com<br> <hr> <b> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Extracted

Path

\Device\HarddiskVolume1\HOW_TO_RECOVER_DATA.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">118281505A0CD820B7D651C73218F1BED5E5B1CA8F057B8C71129A679C940CF4704C803345BEBA06767B56EB2A5E03463CD0D9A9F8868827C3424277D2E57244<br>379D8DAAAC7729678D6432C2543C5A53CDBABB59D62C271CD30CAD30F5ECC01AC648E5AB6058878F099849E02694917AD2A070523A5ED92BFF8E3749CFF4<br>C7AF0758C4CDC7599D62B47771AC28F1AA1F9AEC8C3EBD7192A5A2AFA0FC1EE95D2758B61C186BA9A2E2F24D10DB3CCE6C1FD9CC8CB68993BF0EC9F3385D<br>366699CEABFFAB38AE9C54700AEC8C11D432C5A73A2E8425C9960BA328D4585E47066CA602BED0628657AF58745536CA80B9DF4C80DD3EA8A7BF3CBA60DD<br>41BF6074C7A5923520E33A1F7E779B11E1482445D1F6FAF6FD943ACAC9CF4D3AAB85FA34A96E1D27B3EE1A60BD12BBA2C9586DEE3474933D1FDA392C37EB<br>76AE7B1566C459E8699BE456035F839F73D0F91840BCBFDCE01F17113A2409EA9401A9F8F40A077FD302EDAF9CFF9B1305B8159016CE0F2DC054C58DC566<br>71970A2868744C8E328F6135CBA6EC9F61FD4A426FCC36E0D9D3CC4C78BBCF9EAF00AD6EC9A81204B4BBEC6F326635345AB6E0CED2998583B33396218B78<br>16EB2EB048D10F2A26C0859D0CCFD1DBA585AF0F1495183BB945910F376051C809A0ED8DDA518A0A3D09B078074DFB6666FD9A0CC21AB6A5CBC6D03E360B<br>EDF0B299851CC7A2B798BB107325</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <a>.onion</a><br> * Note that this server is available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion </a><br> 4. Start a chat and follow the further instructions. <br><br> <hr> <b>If you can not use the above link, use the email:</b><br> <a href="[email protected] ">[email protected] </a> <br><a href="[email protected]">[email protected]</a> <br> <b>* To contact us, create a new free email account on the site:</b> <a href="https://protonmail.com">protonmail.com<br> <hr> <b> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Targets

    • Target

      B.exe

    • Size

      669KB

    • MD5

      c17b2c3980926b02136c0a5fb5dfdaa3

    • SHA1

      938eb1b7f1d985d134957443d4c43ad551727b89

    • SHA256

      4d2b250eb1691bd116eb0004a6b4526afe62631551d6d31d4da482ab5ec3b021

    • SHA512

      f770b1dfd74e58ff9d67f0e91ac070e92251598efc45863acf827098cc52f2868c7e2698fd5b0a3a178ea1d1446d32882dfd0601526dbfb27df1251d76c5881b

    • SSDEEP

      12288:dQA0FfTcwpBuV2UxqDmuiLZeUaoFi2XZWfGe615HhAZV8DjKD/KeX:Tuf4wTuV2Ux3uIZeUBi2Te6HWyKrKe

    • MedusaLocker

      Ransomware with several variants first seen in September 2019.

    • MedusaLocker payload

    • Medusalocker family

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (325) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Target

      Build.exe

    • Size

      669KB

    • MD5

      b446b1c86f3d27bb39783f9d3a112a40

    • SHA1

      d9f66f8db27686f4f3b2c7d17557c84077ac801f

    • SHA256

      1f5eefc1feb47e11e53f82055ca0921fc1b1299dffa7972c6faeff1904fdad1d

    • SHA512

      c2b7682c265060c1c62be0b4dceba7fed6882b9fdc9cbbd1d379608a482bf215d81a2a3c03cc2df709bc936ee7d06ff1250dde92808bd0e0d1f1ee3410c35d9a

    • SSDEEP

      12288:dQA0FfTcwpBuV2UxqDmuiLZeUaoFi2XZWfGe615HhAZV8DiKD/KeX:Tuf4wTuV2Ux3uIZeUBi2Te6HWPKrKe

    • MedusaLocker

      Ransomware with several variants first seen in September 2019.

    • MedusaLocker payload

    • Medusalocker family

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (279) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Target

      READ.exe

    • Size

      669KB

    • MD5

      5ec29d96f5fefb2d726f9e120786eaa9

    • SHA1

      3f8d050bd4e823b1f2c681856d1ae6d9007d5861

    • SHA256

      8ee1f51602f957fa82c7e9c0d834d28873307a0c576ab8c7cc99ca85fcf43b2e

    • SHA512

      e21682f2bfee29cd0c0765a10463b2f57bde5996fa367ee2b8b6f7fae9bf5703aec24319ddf2e33890b352331f8fedda41d79ff04ec8a881a6469f6bdba0d5ff

    • SSDEEP

      12288:dQA0FfTcwpBuV2UxqDmuiLZeUaoFi2XZWfGe615HhAZV8DaKD/KeX:Tuf4wTuV2Ux3uIZeUBi2Te6HWPKrKe

    • MedusaLocker

      Ransomware with several variants first seen in September 2019.

    • MedusaLocker payload

    • Medusalocker family

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (260) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Target

      rb.exe

    • Size

      669KB

    • MD5

      ae286ff258c5ec1d15a4fd3f64875d5b

    • SHA1

      576b9e76e385b389f859ee4bde2d12776bbaedca

    • SHA256

      ce0facb2c24c71a20117e27af3aed9d6815500eeadba6e79b472bef539d82769

    • SHA512

      f2cf299e20571701ab7a7ad82103317279e8378f114e3de76b22580eb5e8263a025af1fb653b27323645e0ac63983dcbf6f609154a16e8e9d6c81531c369183b

    • SSDEEP

      12288:dQA0FfTcwpBuV2UxqDmuiLZeUaoFi2XZWfGe615HhAZV8DiKD/KeX:Tuf4wTuV2Ux3uIZeUBi2Te6HWnKrKe

    • MedusaLocker

      Ransomware with several variants first seen in September 2019.

    • MedusaLocker payload

    • Medusalocker family

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (299) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks

static1

medusalocker
Score
10/10

behavioral1

medusalockerdefense_evasiondiscoveryevasionexecutionimpactransomwarespywarestealertrojan
Score
10/10

behavioral2

medusalockerdiscoveryevasionransomwarespywarestealertrojan
Score
10/10

behavioral3

medusalockerdefense_evasiondiscoveryevasionexecutionimpactransomwarespywarestealertrojan
Score
10/10

behavioral4

medusalockerdiscoveryevasionransomwarespywarestealertrojan
Score
10/10

behavioral5

medusalockerdefense_evasiondiscoveryevasionexecutionimpactransomwarespywarestealertrojan
Score
10/10

behavioral6

medusalockerdiscoveryevasionransomwarespywarestealertrojan
Score
10/10

behavioral7

medusalockerdefense_evasiondiscoveryevasionexecutionimpactransomwarespywarestealertrojan
Score
10/10

behavioral8

medusalockerdiscoveryevasionransomwarespywarestealertrojan
Score
10/10