Static task
static1
Behavioral task
behavioral1
Sample
1e2335fef46f7320069623fff6702acb41c2877aff5fec83d94a561af37c3c7a.bin.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
1e2335fef46f7320069623fff6702acb41c2877aff5fec83d94a561af37c3c7a.bin.exe
Resource
win10v20210408
windows10_x64
0 signatures
0 seconds
General
-
Target
1e2335fef46f7320069623fff6702acb41c2877aff5fec83d94a561af37c3c7a.bin
-
Size
678KB
-
MD5
f05df52a73ea28f25d0a85f927f2444a
-
SHA1
a5c00571f42bad2f17db4d4032b07318abc6f7f1
-
SHA256
1e2335fef46f7320069623fff6702acb41c2877aff5fec83d94a561af37c3c7a
-
SHA512
0b2a3a0bde6fcc23565ccdb1df49727930ad53345f91a3450455d0e8fb431a59af74a169d8c6ae2195afc340d7fde42969638f5d4de5501d1f75737be625e0b2
Score
10/10
Malware Config
Signatures
-
MedusaLocker Payload 1 IoCs
Processes:
resource yara_rule sample family_medusalocker -
Medusalocker family
Files
-
1e2335fef46f7320069623fff6702acb41c2877aff5fec83d94a561af37c3c7a.bin.exe windows x86