Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer
-
Size
624KB
-
Sample
250312-lfhpdsvmv6
-
MD5
0168a4daa9598e991e140057e59438f6
-
SHA1
72f715a55aa1ac4a0ea8f1f59406225395350994
-
SHA256
9ec6bf1ad038e6c7f5bf9be374d3299df033424ef1399a8ffd892df40efd6353
-
SHA512
5c94d60a2ae25fdbc7084a6ea183ea50140372b3b2898e5b6b6f305372d58d273f5eab1d18d3b2b785df35eea8b3e2d4e915712bcac0df5ca6eccb0bc4c5e054
-
SSDEEP
12288:T926SX4bMjJCh0cnvpV7WR9tGNQZHA82lmRq60+lAv/2VMePNhEu5Ih8ekUo5RwQ:pfkWMJmVSvGWEM3v/KwkoaRsRWPnexh
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
F:\!!!READ_ME_MEDUSA!!!.txt
https://t.me/+lyskiDn9KiYxZjlh
http://xfv4jzckytb4g3ckwemcny3ihv4i5p4lqzdpi624cxisu35my5fwi5qd.onion/
http://s7lmmhlt3iwnwirxvgjidl6omcblvw2rg75txjfduy73kx5brlmiulad.onion/
http://uyku4o2yg34ekvjtszg6gu7cvjzm6hyszhtu7c55iyuzhpr4k5knewyd.onion/e6f21de05f1464b937174af0eecf5a2e
http://5ar4vuckm3k7osdlzskqkaqmqr4jjpmdikuotmlpkrbsxx7ard3xetyd.onion/e6f21de05f1464b937174af0eecf5a2e
Targets
-
-
Target
2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer
-
Size
624KB
-
MD5
0168a4daa9598e991e140057e59438f6
-
SHA1
72f715a55aa1ac4a0ea8f1f59406225395350994
-
SHA256
9ec6bf1ad038e6c7f5bf9be374d3299df033424ef1399a8ffd892df40efd6353
-
SHA512
5c94d60a2ae25fdbc7084a6ea183ea50140372b3b2898e5b6b6f305372d58d273f5eab1d18d3b2b785df35eea8b3e2d4e915712bcac0df5ca6eccb0bc4c5e054
-
SSDEEP
12288:T926SX4bMjJCh0cnvpV7WR9tGNQZHA82lmRq60+lAv/2VMePNhEu5Ih8ekUo5RwQ:pfkWMJmVSvGWEM3v/KwkoaRsRWPnexh
-
Medusa Ransomware
Ransomware first identified in 2022 that is distinct from the similarly named ransomware family MedusaLocker.
-
Medusaransomware family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (8816) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
2Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Share Discovery
1Peripheral Device Discovery
2Query Registry
4Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1