General
-
Target
svhost.exe
-
Size
669KB
-
Sample
210918-nl3ymahcd9
-
MD5
5ec29d96f5fefb2d726f9e120786eaa9
-
SHA1
3f8d050bd4e823b1f2c681856d1ae6d9007d5861
-
SHA256
8ee1f51602f957fa82c7e9c0d834d28873307a0c576ab8c7cc99ca85fcf43b2e
-
SHA512
e21682f2bfee29cd0c0765a10463b2f57bde5996fa367ee2b8b6f7fae9bf5703aec24319ddf2e33890b352331f8fedda41d79ff04ec8a881a6469f6bdba0d5ff
Static task
static1
Behavioral task
behavioral1
Sample
svhost.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
svhost.exe
Resource
win10-en
Malware Config
Extracted
C:\Users\Admin\Desktop\HOW_TO_RECOVER_DATA.html
medusalocker
Targets
-
-
Target
svhost.exe
-
Size
669KB
-
MD5
5ec29d96f5fefb2d726f9e120786eaa9
-
SHA1
3f8d050bd4e823b1f2c681856d1ae6d9007d5861
-
SHA256
8ee1f51602f957fa82c7e9c0d834d28873307a0c576ab8c7cc99ca85fcf43b2e
-
SHA512
e21682f2bfee29cd0c0765a10463b2f57bde5996fa367ee2b8b6f7fae9bf5703aec24319ddf2e33890b352331f8fedda41d79ff04ec8a881a6469f6bdba0d5ff
-
MedusaLocker Payload
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-