Threat intelligence

MedusaLocker is Sweeping Its Gaze

by Security News

Overview

This week, the Sonicwall Capture Labs threat research team investigated a sample of MedusaLocker Ransomware. This ransomware-as-a-service (RaaS), in regular operation since 2021, has recently seen a resurgence as noted in this recent CISA alert. The variant analyzed here uses Bcdedit to perform modifications to the boot loader, remote shell commands to escalate from 32- to 64-bit prompts to bypass security, and aggressively kills all backup services while files are encrypted.

Infection Cycle

The main infector is not packed or encrypted and a majority of the data is unencoded during static analysis.

figure1.png
Figure 1: Initial detection of MedusaLocker sample

The first item that differs from a regular executable is the section labeled “_RDATA”, along with strings for a debug file named  ‘D:\Education\locker\bin\stub_win_x64_encrypter.pdb’. Additional and previously noted strings are “PUTINHUILLO1337” and the directory item “SOFTWARE/PAIDMEMES”, which may or may not be created during runtime.

figure2.png
Figure 2: Noted strings that occur within Medusa executables

When the program is launched, checks are performed for locale, system time, and running processes. There are also environmental checks for virtual environments such as VMWare, and any debugging software. Then, the following actions are taken while the system files are encrypted using AES-256:

- bcdedit.exe is run to change boot settings and prevent Safe Mode using the following commands:

  • C:\Windows\SysWOW64\cmd.exe \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c bcdedit.exe /set {default} recoverynabled No
  • C:\Windows\SysWOW64\cmd.exe \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures

- Shadow Copies are removed using vssadmin:

  • C:\Windows\SysWOW64\cmd.exe \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c vssadmin.exe Delete Shadows /All /Quiet

- A registry key is created for persistence:

  • HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BabyLockerKZ

- taskkill.exe is used to terminate the following processes:

  • sqlserv.exe
  • sqlbrowser.exe
  • sqlwriter.exe
  • sqlagent.exe
  • msmdsrv.exe
  • msdtssrvr.exe
  • sqlceip.exe
  • fdlauncher.exe
  • ssms.exe
  • fdhost.exe
  • msftesql.exe
  • pg_ctl.exe
  • postgres.exe

- Elevated commands are used to stop additional services:

  • C:\Windows\SysWOW64\cmd.exe \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c net stop {MSSQLServerADHelper100, MSSQL$ISARS, MSSQL$MSFW, SQLAgent$ISARS, SQLAgent$MSFW, SQLBrowser, ReportServer$ISARS, SQLWriter}

- Uses WMIC to query system information:

  • IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
  • IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem

figure3.png
Figure 3: ‘BabyLockerKZ’ is the registry entry written for persistence

Windows Restart Manager is loaded to unlock files in use for encryption. An internet connectivity check is performed by querying ‘google.com’ over DNS. Keystrokes are hooked using ‘GetAsyncKeyState’, though no traffic or logging of keystrokes was detected during runtime.

figure4.png
Figure 4: RmStartSession is used to unlock and close processes/files otherwise inaccessible

Once the encryption has started, a ransom note called ‘How_to_back_files.html’ is written to every directory.

figure5.png
Figure 5: The ransom note contents

The listed addresses to contact are ithelp01@securitymy.name and ithelp01@yousheltered.com.

SonicWall Protections

To ensure SonicWall customers are prepared for any exploitation that may occur due to this malware, this and other variants of MedusaLocker are detected and stopped by RTDMI.

IOCs

c61fbe0324b43da01020f484f20d4ec0fd7eba35c5bb574ca3936b6550e141d7

Share This Article

An Article By

Security News

The SonicWall Capture Labs Threat Research Team gathers, analyzes and vets cross-vector threat information from the SonicWall Capture Threat network, consisting of global devices and resources, including more than 1 million security sensors in nearly 200 countries and territories. The research team identifies, analyzes, and mitigates critical vulnerabilities and malware daily through in-depth research, which drives protection for all SonicWall customers. In addition to safeguarding networks globally, the research team supports the larger threat intelligence community by releasing weekly deep technical analyses of the most critical threats to small businesses, providing critical knowledge that defenders need to protect their networks.

Related Articles

  • Critical Apache Tomcat RCE Vulnerability (CVE-2025-24813) Under Active Exploitation
    Read More
  • SonicWall Detects Credential-Stealing SVG File in Phishing Campaign
    Read More