General

  • Target

    b2493a580153291b69ca23190d00a00b1220cd0aadf469b3974fdaa726516649.exe

  • Size

    719KB

  • Sample

    250223-pzqe5axla1

  • MD5

    8474039d83805eb7b447325c3a8d1ebb

  • SHA1

    a07d537f4253745a087709a9a07c449f84deed8d

  • SHA256

    b2493a580153291b69ca23190d00a00b1220cd0aadf469b3974fdaa726516649

  • SHA512

    3272091bbf123ba5e1592e8b2bd7740cddcb174fa158bc6980b25ee61d92387e94a25284736253f83a6eea78b427f6717e888e843db9d7759cfe9a7676576438

  • SSDEEP

    12288:q4UOTYQivI2qZ7aSgLwkFVpzUvest4ZEbjJLuhJVoM7SPd:bRTYVQ2qZ7aSgLwuVfstRJL6YM6

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Recovery_Instructions.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">5EBBEF47970666C5D159BE3675221010E301DE6983EF58AE997F441E35207ABBFD386B06A8AF000CA9000C53C54EAE1C2A12761F4EF5264DD00B5B7DD70EAF77<br>6B506D0730539805C7F4F1414FAD8A3E1D761AA867D1CED501442895B5EB1DAE4C04BA168D6E973F89769E00081EF211F8FBB0D37169CFC97125EB5B335A<br>E52AD743A993BBF0CE355F262A29E507307AE9FB25E298DBD39C992B94103BA548495D415027FF0D009A8B1521E56721EF53C13EFF255D9CF078778C3737<br>C31AC35C2E98145C7B54C3D2FD74EFD3D78EE9781276F1B338CEFD8DC62869660F2A87831863E72D6C9A4B6527FB1997B2CB1649B2C54E3C0B34DA0C2BB6<br>7A4AF2A09C20E230452380AA3D9534EEEEC0F0BA2E26E12286B6972305602D023444108F90DA3BBA7902B611EFA12272293C385244BFEEF4FFA6D591CFA8<br>3767C2A091385036B09ADF52897AB49E5B485A5248F38A2BF13747B7C7A10E79536405CEC14E37B74C07C12C7E3ED8B9A980C7B7AC800004744F52AFF8C7<br>96BEF53D9888706E464A6F2C52EF345646B74CDFB0D8102E18C7A888C1A53149EF790933B37B00AFB57400CB8E18F2EA9A5FD48794788324265351171AA4<br>8FA72E3677B366598BE7E182C07C0A2C80423A8ED44599B1ECD5FF32A4033E36694DF1CE1B92DA45FA018D4A65A23C4C77842BF45A8630491F01243EB235<br>2A949A7F0EC6C328A059B3CE6E52</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <a>http://gvlay6u4g53rxdi5.onion/31-LPy3hdSfGLBgLSfGcKN9rubDKoa1VMK4-rDHRYHYXycX1u5UuV47YxTOMH17Bx7Sc</a><br> * Note that this server is available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open "{{URL}}". <br> 4. Start a chat and follow the further instructions. <br><br> <hr> <b>If you can not use the above link, use the email:</b><br> <a href="obloy@tutanota.com">obloy@tutanota.com</a> <br><a href="obloy@outlook.com">obloy@outlook.com</a> <br> <b>* To contact us, create a new mail on the site:</b> <a href="https://protonmail.com">protonmail.com<br> <hr> <b>Make contact as soon as possible. Your private key (decryption key) <br> is only stored temporarily.<br><br> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>
Emails

href="obloy@tutanota.com">obloy@tutanota.com</a>

href="obloy@outlook.com">obloy@outlook.com</a>

Extracted

Path

C:\Recovery\WindowsRE\Recovery_Instructions.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">3096705505D2BA634E8DC13C3EF1A4ED024C3771AD6FA3B9363BAE1F4441F6FE6ADF8E81B521AE205972FF757AA6C8F4F97CD299B7229B5288856F7041741B5A<br>FFD403508D4A201F6A58E1096A2B68058D26FF7845DA73B6D91BDDE06C9B369C5DE81A57F692B276035A4DDE3E58C6C77F4C8E2FBFC75A7FD7F842BE0DFF<br>74473143792D1F9028577F870F5F354C944C39677EEBD06EC38D426FB6B83DEDACE270C16D43092F9C0F61C1A8AC3C068E73DB6281E7E0C0183646E5BA28<br>2415519BC83E011FD91925F26F17372D79AAEF3A98E57F1CFEE58B1B60432C3C59142B8E0B34DF5EF02563460F59FC7F09B92C9487FD32411A67075BD923<br>3392F45D84134CD9D69AF283758D294AFD98120858D103AF3E8214C5215D3C29F59CDB597A600B0B52A23E913D44696406E009A45264EBE4ADFF3B5F883E<br>795E902477B508CBF70E374CFB49D5CB57DC323BBF9FBC1C2C4106E2524E889770D1560CB9E9819910142573429BF58AD7F4D9345577222DA67BFC0492C3<br>0A14BC60805ADE3F7E367AB8E96E72E03B8CB76D0C761DD74BAB2EEC1A375B96911C9010B15E31875C8308A152E263EAA9076A97AF2621ADDAD616EB460C<br>B6B1BE4D512503BCF38B725966BCAC7E97ED8BCF0EB1D09533534E59FB1028C51A7AD39A8B6D17BA936E25E1B743B46E758C2D23A5673E73989B122766EA<br>1F2A9F721F85C2520BA992577888</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <a>http://gvlay6u4g53rxdi5.onion/31-LPy3hdSfGLBgLSfGcKN9rubDKoa1VMK4-yRnDjqbjA3gSbOvCb08V4qVAsPZBQ8qS</a><br> * Note that this server is available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open "{{URL}}". <br> 4. Start a chat and follow the further instructions. <br><br> <hr> <b>If you can not use the above link, use the email:</b><br> <a href="obloy@tutanota.com">obloy@tutanota.com</a> <br><a href="obloy@outlook.com">obloy@outlook.com</a> <br> <b>* To contact us, create a new mail on the site:</b> <a href="https://protonmail.com">protonmail.com<br> <hr> <b>Make contact as soon as possible. Your private key (decryption key) <br> is only stored temporarily.<br><br> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>
Emails

href="obloy@tutanota.com">obloy@tutanota.com</a>

href="obloy@outlook.com">obloy@outlook.com</a>

Targets

    • Target

      b2493a580153291b69ca23190d00a00b1220cd0aadf469b3974fdaa726516649.exe

    • Size

      719KB

    • MD5

      8474039d83805eb7b447325c3a8d1ebb

    • SHA1

      a07d537f4253745a087709a9a07c449f84deed8d

    • SHA256

      b2493a580153291b69ca23190d00a00b1220cd0aadf469b3974fdaa726516649

    • SHA512

      3272091bbf123ba5e1592e8b2bd7740cddcb174fa158bc6980b25ee61d92387e94a25284736253f83a6eea78b427f6717e888e843db9d7759cfe9a7676576438

    • SSDEEP

      12288:q4UOTYQivI2qZ7aSgLwkFVpzUvest4ZEbjJLuhJVoM7SPd:bRTYVQ2qZ7aSgLwuVfstRJL6YM6

    • Detect Neshta payload

    • MedusaLocker

      Ransomware with several variants first seen in September 2019.

    • MedusaLocker payload

    • Medusalocker family

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Neshta family

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (223) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.