General
-
Target
skynet.exe
-
Size
678KB
-
Sample
210129-3m4sl1alsx
-
MD5
115b22d9cff82d75c28e43f83f55c663
-
SHA1
8c0c54194a88551feec78c5a8416411ed17c4fce
-
SHA256
fbf6c8f0857d888385f6bc0d46523ebcc1634e06d0e96411fc43a8ae4213d1f3
-
SHA512
9f1a50d735fb30ca0464ad8746929c416d5fee3ee14dfb2fab43abb3e7000e0bf478dc337b8e4fe6c2f8ec6fc2ccc17b73c9429df6799bc91faa04710a0051de
Static task
static1
Behavioral task
behavioral1
Sample
skynet.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
skynet.exe
Resource
win10v20201028
Malware Config
Targets
-
-
Target
skynet.exe
-
Size
678KB
-
MD5
115b22d9cff82d75c28e43f83f55c663
-
SHA1
8c0c54194a88551feec78c5a8416411ed17c4fce
-
SHA256
fbf6c8f0857d888385f6bc0d46523ebcc1634e06d0e96411fc43a8ae4213d1f3
-
SHA512
9f1a50d735fb30ca0464ad8746929c416d5fee3ee14dfb2fab43abb3e7000e0bf478dc337b8e4fe6c2f8ec6fc2ccc17b73c9429df6799bc91faa04710a0051de
-
MedusaLocker Payload
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-