{"id":92147,"date":"2023-10-13T19:29:52","date_gmt":"2023-10-13T13:59:52","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=92147"},"modified":"2023-10-13T19:29:52","modified_gmt":"2023-10-13T13:59:52","slug":"medusalocker-ransomware-an-in-depth-technical-analysis-and-prevention-strategies","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/medusalocker-ransomware-an-in-depth-technical-analysis-and-prevention-strategies\/","title":{"rendered":"MedusaLocker Ransomware: An In-Depth Technical Analysis and Prevention Strategies"},"content":{"rendered":"<p>Our recent research has highlighted the presence of the MedusaLocker ransomware, which first surfaced in mid-2019. Its primary targets are the Hospital and Healthcare industries. MedusaLocker employs AES and RSA encryption techniques to encrypt victims&#8217; data.<\/p>\n<h3>Technical Analysis<\/h3>\n<p>At the start, it performs a check for the presence of a Mutex. If the Mutex does not exist, it proceeds to create the Mutex using the CreateMutexW() function, as shown in the below fig:<\/p>\n<figure id=\"attachment_92151\" aria-describedby=\"caption-attachment-92151\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-92151 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/10\/Fig1-Creating-the-Mutex-650x170.png\" alt=\"\" width=\"650\" height=\"170\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig1-Creating-the-Mutex-650x170.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig1-Creating-the-Mutex-300x78.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig1-Creating-the-Mutex-768x200.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig1-Creating-the-Mutex-789x206.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig1-Creating-the-Mutex-150x39.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig1-Creating-the-Mutex.png 927w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-92151\" class=\"wp-caption-text\">Creating the Mutex<\/figcaption><\/figure>\n<p>MedusaLocker checks to determine whether the current process runs with administrative privileges. If it detects that the process lacks admin privileges, it employs a User Account Control (UAC) bypass technique to attain elevated privileges.<\/p>\n<figure id=\"attachment_92152\" aria-describedby=\"caption-attachment-92152\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-92152 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/10\/Fig2-Elevating-administrator-privilege-650x242.png\" alt=\"\" width=\"650\" height=\"242\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig2-Elevating-administrator-privilege-650x242.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig2-Elevating-administrator-privilege-300x112.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig2-Elevating-administrator-privilege-768x286.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig2-Elevating-administrator-privilege-789x294.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig2-Elevating-administrator-privilege-150x56.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig2-Elevating-administrator-privilege.png 794w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-92152\" class=\"wp-caption-text\">Elevating Administrator Privelege<\/figcaption><\/figure>\n<figure id=\"attachment_92153\" aria-describedby=\"caption-attachment-92153\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-92153 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/10\/Fig3-UAC-bypass-650x194.png\" alt=\"\" width=\"650\" height=\"194\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig3-UAC-bypass-650x194.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig3-UAC-bypass-300x90.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig3-UAC-bypass-768x230.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig3-UAC-bypass-789x236.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig3-UAC-bypass-150x45.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig3-UAC-bypass.png 1017w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-92153\" class=\"wp-caption-text\">UAC Bypass<\/figcaption><\/figure>\n<p>It adds the registry key HKEY_CURRENT_USER\\SOFTWARE\\MDSLK\\ with the name \u201cself\u201d and data as the application name, designating the system being infected by MDuSaLocker.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-92154 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/10\/fig4-650x188.png\" alt=\"\" width=\"650\" height=\"188\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/fig4-650x188.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/fig4-300x87.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/fig4-768x222.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/fig4-789x228.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/fig4-150x43.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/fig4.png 918w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<figure id=\"attachment_92155\" aria-describedby=\"caption-attachment-92155\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-92155 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/10\/fig5-650x122.png\" alt=\"\" width=\"650\" height=\"122\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/fig5-650x122.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/fig5-300x56.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/fig5-150x28.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/fig5.png 756w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-92155\" class=\"wp-caption-text\">Registry Entry<\/figcaption><\/figure>\n<h3>Disables the Services and Terminates the Processes:<\/h3>\n<p>Like other ransomware, MedusaLocker also terminates specific services by referencing a hardcoded list of services. It compares this list with the currently running services, and if any of the hardcoded services are found to be running, it stops them using the CloseServiceHandle(), as shown in the below fig:<\/p>\n<figure id=\"attachment_92156\" aria-describedby=\"caption-attachment-92156\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-92156 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/10\/Fig6-Disables-the-running-service-650x134.png\" alt=\"\" width=\"650\" height=\"134\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig6-Disables-the-running-service-650x134.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig6-Disables-the-running-service-300x62.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig6-Disables-the-running-service-768x158.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig6-Disables-the-running-service-789x162.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig6-Disables-the-running-service-150x31.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig6-Disables-the-running-service.png 983w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-92156\" class=\"wp-caption-text\">Disables the Running Space<\/figcaption><\/figure>\n<p><strong><em>List of Hardcoded services:<\/em><\/strong><\/p>\n<p>wrapper, DefWatch, ccEvtMgr, ccSetMgr, SavRoam, sqlservr, sqlagent, sqladhlp, Culserver, RTVscan, sqlbrowser, SQLADHLP, QBIDPService, Intuit.QuickBooks.FCS, QBCFMonitorService, sqlwriter, msmdsrv, tomcat6, zhudongfangyu, SQLADHLP, vmware-usbarbitator64, vmware-converter, dbsrv12, dbeng8<\/p>\n<p>Ransomware uses CreateToolhelp32Snapshot() to retrieve the running processes. It compares with a predefined list of hardcoded processes. If any of the hardcoded processes are detected as running, the ransomware proceeds to terminate those processes using the TerminateProcess, as shown in the below fig:<\/p>\n<figure id=\"attachment_92150\" aria-describedby=\"caption-attachment-92150\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-92150 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/10\/fig-7-Terminating-the-Running-process.-650x108.png\" alt=\"\" width=\"650\" height=\"108\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/fig-7-Terminating-the-Running-process.-650x108.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/fig-7-Terminating-the-Running-process.-300x50.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/fig-7-Terminating-the-Running-process.-768x128.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/fig-7-Terminating-the-Running-process.-789x132.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/fig-7-Terminating-the-Running-process.-150x25.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/fig-7-Terminating-the-Running-process..png 947w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-92150\" class=\"wp-caption-text\">Terminating the Running Process<\/figcaption><\/figure>\n<p><em><strong>List of Hardcoded Process:<\/strong><\/em><\/p>\n<p>wxServer.exe, wxServerView, sqlservr.exe, sqlmangr.exe, RAgui.exe, supervise.exe, Culture.exe, RTVscan.exe, Defwatch.exe, sqlbrowser.exe, winword.exe, QBW32.exe, QBDBMgr.exe, qbupdate.exe, QBCFMonitorService.exe, axlbridge.exe, QBIDPService.exe, httpd.exe, fdlauncher.exe, MsDtSrvr.exe, tomcat6.exe, java.exe, 360se.exe, 360doctor.exe, wdswfsafe.exe, fdlauncher.exe, fdhost.exe, GDscan.exe, ZhuDongFangYu.exe<\/p>\n<h3>Deleting Shadow Copy and Disabling Data Recovery:<\/h3>\n<p>MedusaLocker uses hardcoded commands to remove backups, delete the shadow copy, etc.<\/p>\n<figure id=\"attachment_92157\" aria-describedby=\"caption-attachment-92157\" style=\"width: 570px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-92157 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/10\/Fig7-Hardcoded-commands.png\" alt=\"\" width=\"570\" height=\"242\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig7-Hardcoded-commands.png 570w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig7-Hardcoded-commands-300x127.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig7-Hardcoded-commands-150x64.png 150w\" sizes=\"(max-width: 570px) 100vw, 570px\" \/><figcaption id=\"caption-attachment-92157\" class=\"wp-caption-text\">Hardcoded Commands<\/figcaption><\/figure>\n<h3>PERSISTENCE<\/h3>\n<p>Medusa Locker ransomware duplicates its malicious executable as either &#8220;svhost.exe&#8221; or &#8220;svchostt.exe&#8221; within the user&#8217;s roaming application data directory (%AppData%\\Roaming) to establish persistence and ensure the malware runs during system start-up, allowing it to continue encrypting files.<\/p>\n<figure id=\"attachment_92158\" aria-describedby=\"caption-attachment-92158\" style=\"width: 480px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-92158 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/10\/Fig8-Persistence-mechanism.png\" alt=\"\" width=\"480\" height=\"295\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig8-Persistence-mechanism.png 480w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig8-Persistence-mechanism-300x184.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig8-Persistence-mechanism-150x92.png 150w\" sizes=\"(max-width: 480px) 100vw, 480px\" \/><figcaption id=\"caption-attachment-92158\" class=\"wp-caption-text\">Persistence Mechanism<\/figcaption><\/figure>\n<h3>ENCRYPTION<\/h3>\n<p>In the encryption process like other ransomware, it also excludes the list of files, folders, and hardcoded extensions from the encryption process.<\/p>\n<p>The ransomware uses both AES+RSA encryption keys. The ransomware employs AES 256 encryption to lock the victim&#8217;s files, creating a unique AES encryption key. This AES key is then encrypted using an embedded RSA public key, resulting in the ciphertext. The RSA encryption ensures that without the corresponding private key, decryption of the AES key is practically impossible.<\/p>\n<p>The AES key is essential for unlocking the victim&#8217;s files, making access contingent on obtaining the private key from the attackers.<\/p>\n<figure id=\"attachment_92159\" aria-describedby=\"caption-attachment-92159\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-92159 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/10\/Fig9-RSA-KEY-650x204.png\" alt=\"\" width=\"650\" height=\"204\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig9-RSA-KEY-650x204.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig9-RSA-KEY-300x94.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig9-RSA-KEY-768x241.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig9-RSA-KEY-789x248.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig9-RSA-KEY-150x47.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig9-RSA-KEY.png 805w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-92159\" class=\"wp-caption-text\">RSA-KEY<\/figcaption><\/figure>\n<figure id=\"attachment_92160\" aria-describedby=\"caption-attachment-92160\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-92160 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/10\/Fig10-Iteration-of-Drive-650x149.png\" alt=\"\" width=\"650\" height=\"149\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig10-Iteration-of-Drive-650x149.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig10-Iteration-of-Drive-300x69.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig10-Iteration-of-Drive-150x34.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig10-Iteration-of-Drive.png 685w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-92160\" class=\"wp-caption-text\">Iteration of Drive<\/figcaption><\/figure>\n<p>The ransomware tries to retrieve the logical drives using the API call GetLogicalDrives to encrypt the system.<\/p>\n<figure id=\"attachment_92161\" aria-describedby=\"caption-attachment-92161\" style=\"width: 419px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-92161 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/10\/Fig11-Calling-encryption-function..png\" alt=\"\" width=\"419\" height=\"184\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig11-Calling-encryption-function..png 419w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig11-Calling-encryption-function.-300x132.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig11-Calling-encryption-function.-150x66.png 150w\" sizes=\"(max-width: 419px) 100vw, 419px\" \/><figcaption id=\"caption-attachment-92161\" class=\"wp-caption-text\">Calling Encryption Function<\/figcaption><\/figure>\n<p>It drops the Ransom note in an HTML file which contains the personal ID, Tor link, and emails of attackers.<\/p>\n<figure id=\"attachment_92162\" aria-describedby=\"caption-attachment-92162\" style=\"width: 561px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-92162 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/10\/Fig12-Ransom-note-Dropped-by-Medusa-Ransomware.png\" alt=\"\" width=\"561\" height=\"351\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig12-Ransom-note-Dropped-by-Medusa-Ransomware.png 561w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig12-Ransom-note-Dropped-by-Medusa-Ransomware-300x188.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig12-Ransom-note-Dropped-by-Medusa-Ransomware-150x94.png 150w\" sizes=\"(max-width: 561px) 100vw, 561px\" \/><figcaption id=\"caption-attachment-92162\" class=\"wp-caption-text\">Ransom Note Dropped by Medusa Ransomware<\/figcaption><\/figure>\n<figure id=\"attachment_92163\" aria-describedby=\"caption-attachment-92163\" style=\"width: 473px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-92163 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/10\/Fig13-Encrypted-files-with-extension-L54.png\" alt=\"\" width=\"473\" height=\"136\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig13-Encrypted-files-with-extension-L54.png 473w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig13-Encrypted-files-with-extension-L54-300x86.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig13-Encrypted-files-with-extension-L54-150x43.png 150w\" sizes=\"(max-width: 473px) 100vw, 473px\" \/><figcaption id=\"caption-attachment-92163\" class=\"wp-caption-text\">Encrypted Files with Extension &#8220;L54&#8221;<\/figcaption><\/figure>\n<h3>Network Infection:<\/h3>\n<figure id=\"attachment_92164\" aria-describedby=\"caption-attachment-92164\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-92164 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/10\/Fig13-Network-Enumeration-650x367.png\" alt=\"\" width=\"650\" height=\"367\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig13-Network-Enumeration-650x367.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig13-Network-Enumeration-300x170.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig13-Network-Enumeration-150x85.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/Fig13-Network-Enumeration.png 676w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-92164\" class=\"wp-caption-text\">Network Enumeration<\/figcaption><\/figure>\n<p>After Encryption, the ransomware uses Windows Network API NetShareEnum to enumerate network share. It processes share names, performs string manipulations, and checks for the presence of &#8220;$&#8221; in share names.<\/p>\n<p>It seeks to spread to other devices on the same network, attempting to infect them like a digital contagion.<\/p>\n<h3><strong>How do we prevent such kinds of attacks?<\/strong><\/h3>\n<p>\u00b7 Do not download and open any attachments from unknown sources.<\/p>\n<p>\u00b7 Avoid clicking on any unverified link. The leading cause of ransomware attacks is clicking on untrusted links and attachments.<\/p>\n<p>\u00b7 Regularly update your operating system, applications, and software to fix known vulnerabilities, often exploited by ransomware.<\/p>\n<p>\u00b7 Back up your data so that it can be recovered in case of a ransomware attack.<\/p>\n<h3>Conclusion<\/h3>\n<p>Medusa Locker ransomware is a notorious strain of malicious software that encrypts victims&#8217; files, rendering them inaccessible until a ransom is paid. This dangerous malware has caused widespread damage to individuals and organizations alike. As cybercriminals continually evolve their tactics, the threat of Medusa Locker remains ever-present.<\/p>\n<h3>Quick Heal Protection:<\/h3>\n<p>\u00b7 Generic Signature names:<\/p>\n<p>\u00b7 Ransom.Medusa.S27286013<\/p>\n<p>\u00b7 Ransom.Medusa.S13913779<\/p>\n<p>\u00b7 Ransom.MedusaLock.S9836707<\/p>\n<p>\u00b7 Trojan.YakbeexMSIL.ZZ4<\/p>\n<p>\u00b7 Ransom.Medusa.S10272352<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-92167 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/10\/MicrosoftTeams-image-8-650x327.jpg\" alt=\"\" width=\"650\" height=\"327\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/MicrosoftTeams-image-8-650x327.jpg 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/MicrosoftTeams-image-8-300x151.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/MicrosoftTeams-image-8-768x387.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/MicrosoftTeams-image-8-789x397.jpg 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/MicrosoftTeams-image-8-150x76.jpg 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/10\/MicrosoftTeams-image-8.jpg 1080w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<h3>IOCs:<\/h3>\n<p>6da9c76a6e319c17f1d39e0ae2eaf2af<\/p>\n<p>4ef811b784b985769645e03bc0b9cd24<\/p>\n<p>61b0906f31ce772130b0ee9c4b86dc92<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Author &#8211; Soumen Burma<\/strong><\/p>\n<p><strong>Co-Author &#8211; Vaibhav Krushna Billade<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our recent research has highlighted the presence of the MedusaLocker ransomware, which first surfaced in mid-2019. Its primary targets are the Hospital and Healthcare industries. MedusaLocker employs AES and RSA encryption techniques to encrypt victims&#8217; data. Technical Analysis At the start, it performs a check for the presence of a Mutex. If the Mutex does [&hellip;]<\/p>\n","protected":false},"author":108,"featured_media":92149,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1660,164,289,910,6,1],"tags":[1922],"class_list":["post-92147","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-advisory","category-cyber-crime","category-cyber-safety","category-ransomware","category-tips","category-uncategorized","tag-quick-heal-ransomware-cybersecurity-hacking-ransomwareprevention-threatintelligence"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/92147"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/108"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=92147"}],"version-history":[{"count":5,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/92147\/revisions"}],"predecessor-version":[{"id":92170,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/92147\/revisions\/92170"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/92149"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=92147"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=92147"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=92147"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}