Static task
static1
Behavioral task
behavioral1
Sample
4ae110bb89ddcc45bb2c4e980794195ee5eb85b5261799caedef7334f0f57cc4.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
4ae110bb89ddcc45bb2c4e980794195ee5eb85b5261799caedef7334f0f57cc4.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
4ae110bb89ddcc45bb2c4e980794195ee5eb85b5261799caedef7334f0f57cc4
-
Size
678KB
-
MD5
82143033173cbeee7f559002fb8ab8c5
-
SHA1
e03aedb8b9770f899a29f1939636db43825e95cf
-
SHA256
4ae110bb89ddcc45bb2c4e980794195ee5eb85b5261799caedef7334f0f57cc4
-
SHA512
77377c732c3fb944f56170e6382fbc25e8bbe1f2ffd42290c52da5f33f7301272c67356843464c89bba71b8c45e3d4222fe70bb7a1f80bbe89b3ce2dc498dcf1
Score
10/10
Malware Config
Signatures
-
MedusaLocker Payload 1 IoCs
Processes:
resource yara_rule sample family_medusalocker -
Medusalocker family
Files
-
4ae110bb89ddcc45bb2c4e980794195ee5eb85b5261799caedef7334f0f57cc4.exe windows x86