General
-
Target
4ae110bb89ddcc45bb2c4e980794195ee5eb85b5261799caedef7334f0f57cc4
-
Size
678KB
-
Sample
210329-bjc4pk8dxj
-
MD5
82143033173cbeee7f559002fb8ab8c5
-
SHA1
e03aedb8b9770f899a29f1939636db43825e95cf
-
SHA256
4ae110bb89ddcc45bb2c4e980794195ee5eb85b5261799caedef7334f0f57cc4
-
SHA512
77377c732c3fb944f56170e6382fbc25e8bbe1f2ffd42290c52da5f33f7301272c67356843464c89bba71b8c45e3d4222fe70bb7a1f80bbe89b3ce2dc498dcf1
Static task
static1
Behavioral task
behavioral1
Sample
4ae110bb89ddcc45bb2c4e980794195ee5eb85b5261799caedef7334f0f57cc4.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
4ae110bb89ddcc45bb2c4e980794195ee5eb85b5261799caedef7334f0f57cc4.exe
Resource
win10v20201028
Malware Config
Targets
-
-
Target
4ae110bb89ddcc45bb2c4e980794195ee5eb85b5261799caedef7334f0f57cc4
-
Size
678KB
-
MD5
82143033173cbeee7f559002fb8ab8c5
-
SHA1
e03aedb8b9770f899a29f1939636db43825e95cf
-
SHA256
4ae110bb89ddcc45bb2c4e980794195ee5eb85b5261799caedef7334f0f57cc4
-
SHA512
77377c732c3fb944f56170e6382fbc25e8bbe1f2ffd42290c52da5f33f7301272c67356843464c89bba71b8c45e3d4222fe70bb7a1f80bbe89b3ce2dc498dcf1
-
MedusaLocker Payload
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-