Overview
overview
10Static
static
10Videos/64/64.exe
windows7-x64
1Videos/64/64.exe
windows10-2004-x64
8Videos/64/86.exe
windows7-x64
3Videos/64/86.exe
windows10-2004-x64
6Videos/64/...E.html
windows7-x64
3Videos/64/...E.html
windows10-2004-x64
8Videos/64/dump.bat
windows7-x64
9Videos/64/dump.bat
windows10-2004-x64
9Videos/64/mimidrv.sys
windows7-x64
10Videos/64/mimidrv.sys
windows10-2004-x64
10Videos/64/...tz.dll
windows7-x64
1Videos/64/...tz.dll
windows10-2004-x64
6Videos/64/mimilib.dll
windows7-x64
1Videos/64/mimilib.dll
windows10-2004-x64
8Videos/64/...ol.dll
windows7-x64
1Videos/64/...ol.dll
windows10-2004-x64
8Videos/Adv...69.exe
windows7-x64
4Videos/Adv...69.exe
windows10-2004-x64
6Videos/Cap...E.html
windows7-x64
3Videos/Cap...E.html
windows10-2004-x64
8Videos/PsExec.exe
windows7-x64
3Videos/PsExec.exe
windows10-2004-x64
8Videos/PsExec64.exe
windows7-x64
1Videos/PsExec64.exe
windows10-2004-x64
8Videos/READ_NOTE.html
windows7-x64
3Videos/READ_NOTE.html
windows10-2004-x64
8Videos/crypt154.exe
windows7-x64
10Videos/crypt154.exe
windows10-2004-x64
10General
-
Target
sample.zip
-
Size
21.2MB
-
Sample
250217-nls4esylgk
-
MD5
dd2ae63fda290349d4872d076c3999fa
-
SHA1
d071bf47cb2eb4a8ade4c356c2da448fb5bf2ff8
-
SHA256
b6ae167bc7a98a16120698f2f11452449118662dd3f1cc88e6ef7286465b45ca
-
SHA512
7b01261129b1944d90ac79be21f104095c408995cf80b190287d37805d198ff8729db8011c73b0a4387614f68d4872ab5715f170b5a06ccd73603419674056e3
-
SSDEEP
393216:6MUztzHK7whMRoPVnksbllihtvB4Jdgho+TtdGSa0n+jfnYAdylxQ0C1/Okd+:6Mm9K7waRckqlIhtv+JKhaG+jTdEe1v+
Behavioral task
behavioral1
Sample
Videos/64/64.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Videos/64/64.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral3
Sample
Videos/64/86.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Videos/64/86.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral5
Sample
Videos/64/READ_NOTE.html
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Videos/64/READ_NOTE.html
Resource
win10v2004-20250211-en
Behavioral task
behavioral7
Sample
Videos/64/dump.bat
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
Videos/64/dump.bat
Resource
win10v2004-20250211-en
Behavioral task
behavioral9
Sample
Videos/64/mimidrv.sys
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Videos/64/mimidrv.sys
Resource
win10v2004-20250207-en
Behavioral task
behavioral11
Sample
Videos/64/mimikatz.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Videos/64/mimikatz.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral13
Sample
Videos/64/mimilib.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Videos/64/mimilib.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral15
Sample
Videos/64/mimispool.dll
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
Videos/64/mimispool.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral17
Sample
Videos/Advanced_Port_Scanner_2.5.3869.exe
Resource
win7-20250207-en
Behavioral task
behavioral18
Sample
Videos/Advanced_Port_Scanner_2.5.3869.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral19
Sample
Videos/Captures/READ_NOTE.html
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Videos/Captures/READ_NOTE.html
Resource
win10v2004-20250207-en
Behavioral task
behavioral21
Sample
Videos/PsExec.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Videos/PsExec.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral23
Sample
Videos/PsExec64.exe
Resource
win7-20241023-en
Behavioral task
behavioral24
Sample
Videos/PsExec64.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral25
Sample
Videos/READ_NOTE.html
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
Videos/READ_NOTE.html
Resource
win10v2004-20250211-en
Behavioral task
behavioral27
Sample
Videos/crypt154.exe
Resource
win7-20250207-en
Behavioral task
behavioral28
Sample
Videos/crypt154.exe
Resource
win10v2004-20250211-en
Malware Config
Extracted
medusalocker
Extracted
F:\$RECYCLE.BIN\READ_NOTE.html
Extracted
C:\$Recycle.Bin\READ_NOTE.html
Targets
-
-
Target
Videos/64/64.exe
-
Size
1.4MB
-
MD5
957f2d9e3370212548a57020233e6ba7
-
SHA1
ea5cd55a44b8be532af602002f498717fc192818
-
SHA256
6688fb3039ad6df606d76a897ef1072cdc78b928335c6bfa691d99498caf5c4b
-
SHA512
98baed5d1632311db5b65e5dcd70966e85f25478649e57b7fb6310be0eb3fe54f0bf2e70aa1b8d242479aac0f5d411388635d4b9cf8c3049917fdff7b00c9b63
-
SSDEEP
24576:quogxWGhzk6Cufid1FeXUW07ZG6mpxUr7set:PWd1FekW0olpG
Score8/10-
Downloads MZ/PE file
-
-
-
Target
Videos/64/86.exe
-
Size
1.0MB
-
MD5
6c9ad4e67032301a61a9897377d9cff8
-
SHA1
655979d56e874fbe7561bb1b6e512316c25cbb19
-
SHA256
e81a8f8ad804c4d83869d7806a303ff04f31cce376c5df8aada2e9db2c1eeb98
-
SHA512
1cd75a4c324365735a97001b55e89b936daed5d003ba7059f885eeca4a26eaaa82041450d77483a36d4be30186730c4e4ca4b8af24122fe403c4dde738d3ff96
-
SSDEEP
24576:EuS0VSrYkTp5VFyI0UZK6zU9T8zPnbJFDhOky0c:EuS0O59cX2YcPb7DhCN
Score6/10-
Downloads MZ/PE file
-
-
-
Target
Videos/64/READ_NOTE.html
-
Size
3KB
-
MD5
d2294fc6905efe047a0663b7ffcf79d4
-
SHA1
9bf17f976f73ec0ce4f05dbfdb5d4ebc9fc1f2d0
-
SHA256
c459e80d8500c3db9810f63f835e5cc1e4f08cb2deda4832846edf1eac31e1dd
-
SHA512
983e14d90fe1f5c4993724e1d8ae57132ccda5efc62f0d14146e36c8982d0315753c6aa573f97c6f7d29136051e65eb85bbe9a02846b431a06b5e71ec1ac8a28
Score8/10-
Downloads MZ/PE file
-
-
-
Target
Videos/64/dump.bat
-
Size
418B
-
MD5
daf87494678a5244eccfbf2b27d92096
-
SHA1
3e75976b49a7a7fc80cf44902b5a04ca066d559d
-
SHA256
539e58304db8207a278582902be41a9cbd7d79027fa3c053d8ab5bcc2bdbe081
-
SHA512
c09144ee0db6714a2a71b2030e9b3f722eca0ffe0f1c967056011eb2f33f617f32affe454f416504396f15c7e0ec552db3bfedb5fbff82447f94be023df9aa82
Score9/10-
Downloads MZ/PE file
-
-
-
Target
Videos/64/mimidrv.sys
-
Size
36KB
-
MD5
c94de9019767a79573b25c870936d9a8
-
SHA1
c66a1c6fbeacaf2db288bff8c064dfe775fd1508
-
SHA256
bee3d0ac0967389571ea8e3a8c0502306b3dbf009e8155f00a2829417ac079fc
-
SHA512
e8b712a0b0b65520ec17e5576fe1c7c61a2a2a13502f9626625ef4b988b84178f68c0ca2337e2d766e42c19a681a7df41de3faef950ab0698139b89463ec2031
-
SSDEEP
768:APVvAF3Sz0Kp4TC/ndBW8ipSfnA+vl1qlCGB8zlu0xVHZC5isB:0VvPz0K3AmDlQlHB8zl9xJwisB
-
Mimikatz family
-
mimikatz is an open source tool to dump credentials on Windows
-
Downloads MZ/PE file
-
-
-
Target
Videos/64/mimikatz.dll
-
Size
891KB
-
MD5
21ea77788aa2649614c9ec739f1dd1b8
-
SHA1
2da8d08d67ad3945ebf7a589acdd76dcc4a3510b
-
SHA256
8846c8be509a4b274d6d1465e9cc14d44cfb0a51f917d3a00ce00fa0b35a4284
-
SHA512
0d34428c9814495c823c896dde9981ce5b354209a5da37b5d951546247264dd21861c957ebc035e7801146ceffda234f8cf3a12abfc289a19b78bbc1eaeccac5
-
SSDEEP
12288:1lPuj0/jY2LuBUIAUigqrdT+r9HBARe5iBC4uMmK8DfD8gU:1lPi0/jFLt5gqrwHce5i0lZDfDbU
Score6/10-
Downloads MZ/PE file
-
-
-
Target
Videos/64/mimilib.dll
-
Size
36KB
-
MD5
67651e9d2da634adedbe216948d5f752
-
SHA1
0731bd320633a6d1ca7835e2bba2c5ee5429b293
-
SHA256
aef6ce3014add838cf676b57957d630cd2bb15b0c9193cf349bcffecddbc3623
-
SHA512
88c7de54fd036a3052a49e52a8bb868e1cd67856b8ef1d0f2ad1151f663addf1d9435fb98f83a24cc16ffd832500061b64399c9fe82edcb83404f59daf7bfd47
-
SSDEEP
768:CsdDjdgqUQv+EAZJimW8ahsNekFkTn5btsnsFfZ9kYeUveejil0g:vU+LuaaQkFkTn5b+sFhW7ejil
Score8/10-
Downloads MZ/PE file
-
-
-
Target
Videos/64/mimispool.dll
-
Size
10KB
-
MD5
c6cc0def7d584f431d69126c1cc33a20
-
SHA1
ea2646a646662909cd2bf5443e6b0030fb3cc6eb
-
SHA256
66928c3316a12091995198710e0c537430dacefac1dbe78f12a331e1520142bd
-
SHA512
17199e1be5d40744ae92d5d1b143645fcd0e413b92696fdaeb673785549bf20f4952a19887fe5c14cddbdfa435320a79044510d0de4e2c52fa26a1d2bfd83826
-
SSDEEP
192:DGMoIQaZcsBTSWoH6DlI0zPQ4Ib/me0C0uolZC7:VJxgWFlVC50C0uols
Score8/10-
Downloads MZ/PE file
-
-
-
Target
Videos/Advanced_Port_Scanner_2.5.3869.exe
-
Size
19.4MB
-
MD5
6a58b52b184715583cda792b56a0a1ed
-
SHA1
3477a173e2c1005a81d042802ab0f22cc12a4d55
-
SHA256
d0c1662ce239e4d288048c0e3324ec52962f6ddda77da0cb7af9c1d9c2f1e2eb
-
SHA512
49ee746a98bce076cd20a36d57d08ed0dc39d48a0a2866173d4c0dbb1633e2ec8e069f4dbba578e707c8dd1de1fcc908cf412e4a9fff9ecc78ac92357e75c313
-
SSDEEP
393216:mfKraJBPMvil9ib1pLIfwwbwFanUfziHLKAwj5GIXgsao7sF5Vw11mH:AKravPiisRpkfww8FUUfz9wIqooPm1S
Score6/10-
Downloads MZ/PE file
-
-
-
Target
Videos/Captures/READ_NOTE.html
-
Size
3KB
-
MD5
d2294fc6905efe047a0663b7ffcf79d4
-
SHA1
9bf17f976f73ec0ce4f05dbfdb5d4ebc9fc1f2d0
-
SHA256
c459e80d8500c3db9810f63f835e5cc1e4f08cb2deda4832846edf1eac31e1dd
-
SHA512
983e14d90fe1f5c4993724e1d8ae57132ccda5efc62f0d14146e36c8982d0315753c6aa573f97c6f7d29136051e65eb85bbe9a02846b431a06b5e71ec1ac8a28
Score8/10-
Downloads MZ/PE file
-
-
-
Target
Videos/PsExec.exe
-
Size
331KB
-
MD5
27304b246c7d5b4e149124d5f93c5b01
-
SHA1
e50d9e3bd91908e13a26b3e23edeaf577fb3a095
-
SHA256
3337e3875b05e0bfba69ab926532e3f179e8cfbf162ebb60ce58a0281437a7ef
-
SHA512
bec172a2f92a95796199cfc83f544a78685b52a94061ce0ffb46b265070ee0bcc018c4f548f56018bf3ff1e74952811b2afb6df79ab8d09f1ec73c9477af636b
-
SSDEEP
3072:Yao79VuJ6titIi/H7ZUFgllxiBD+P5xWr3geNtdS+DlGttzhA9HY4ZUFxPkwlmlP:YaSq4TBWISSTgu7DlGtEC1xn/O5r4S
Score8/10-
Downloads MZ/PE file
-
-
-
Target
Videos/PsExec64.exe
-
Size
366KB
-
MD5
9321c107d1f7e336cda550a2bf049108
-
SHA1
fb0a150601470195c47b4e8d87fcb3f50292beb2
-
SHA256
ad6b98c01ee849874e4b4502c3d7853196f6044240d3271e4ab3fc6e3c08e9a4
-
SHA512
5ac1dac5061dd14c1d79d2910c4df6ed059059c7d3f987ebe9790626c327d5fa9c7cdbb4150c004d14750223f33b4fc27fa16b3681371d406c2b715ba757be0e
-
SSDEEP
6144:o9123sLoT4aK8/A+kVG1FHEpgJEvf6sSMWTk7bjgxdO5mVx:on2ZHk/C6vfdHKO5s
Score8/10-
Downloads MZ/PE file
-
-
-
Target
Videos/READ_NOTE.html
-
Size
3KB
-
MD5
d2294fc6905efe047a0663b7ffcf79d4
-
SHA1
9bf17f976f73ec0ce4f05dbfdb5d4ebc9fc1f2d0
-
SHA256
c459e80d8500c3db9810f63f835e5cc1e4f08cb2deda4832846edf1eac31e1dd
-
SHA512
983e14d90fe1f5c4993724e1d8ae57132ccda5efc62f0d14146e36c8982d0315753c6aa573f97c6f7d29136051e65eb85bbe9a02846b431a06b5e71ec1ac8a28
Score8/10-
Downloads MZ/PE file
-
-
-
Target
Videos/crypt154.exe
-
Size
728KB
-
MD5
ee91aeacff16d4ef5fe74b7252291665
-
SHA1
88adb2573e183e44babf88005298cab9a9901d2d
-
SHA256
ea585b7e84b67e8170b76f87115c0fc8423fe6d7184db32ba32b5bfc155e2b34
-
SHA512
d12cf47211a38fe595d855fe336f30946a0a76a4a559e0430e212f68601cd28cab63ffd4acd04c76f4f83950ad2261efb49dff6a2b03fd2aaa4617bc49b1b8a4
-
SSDEEP
12288:R/7tmBxTq87Rro7jx0/O2EbiJtzhCg3sph0lhSMXliuqJTJRg9J:RztmTqwRrSjx0/OpiDhdSh0lhSMXltqe
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Renames multiple (5688) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
4