General
-
Target
4f9a833e79092006c06203a66b41fc9250bcebcee148fea404db75d52035131c.bin
-
Size
669KB
-
Sample
210808-3dcrfzz2ae
-
MD5
4ef811b784b985769645e03bc0b9cd24
-
SHA1
2e04a37b215dd2a95694b1c18dbe1dd35be5aa9f
-
SHA256
4f9a833e79092006c06203a66b41fc9250bcebcee148fea404db75d52035131c
-
SHA512
34e9a5a015b04ae904b50a0b2e466788db16d7eb43769fec156cab830932032174b3a43a206016332f99eb16571225dc1a0a0042ce2bca67de1821bbc08c039c
Static task
static1
Behavioral task
behavioral1
Sample
4f9a833e79092006c06203a66b41fc9250bcebcee148fea404db75d52035131c.bin.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
4f9a833e79092006c06203a66b41fc9250bcebcee148fea404db75d52035131c.bin.exe
Resource
win10v20210408
Malware Config
Targets
-
-
Target
4f9a833e79092006c06203a66b41fc9250bcebcee148fea404db75d52035131c.bin
-
Size
669KB
-
MD5
4ef811b784b985769645e03bc0b9cd24
-
SHA1
2e04a37b215dd2a95694b1c18dbe1dd35be5aa9f
-
SHA256
4f9a833e79092006c06203a66b41fc9250bcebcee148fea404db75d52035131c
-
SHA512
34e9a5a015b04ae904b50a0b2e466788db16d7eb43769fec156cab830932032174b3a43a206016332f99eb16571225dc1a0a0042ce2bca67de1821bbc08c039c
-
MedusaLocker Payload
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-