General
-
Target
B06.exe
-
Size
4.5MB
-
Sample
211004-m37gpsgccl
-
MD5
49fb0e5a3415155c24d6839250cd7fed
-
SHA1
69fa4c797df21b98740368c268cfd1919bf4a6e0
-
SHA256
f2a155473c06ecad973676f1e2a8d228ab4a8adf32a87477c716f31fddf6cbaf
-
SHA512
4bcf713b36e0c0bd1e12018cc835a988dbbb2d54556531ebddf97435fd430dab0393fe55e16de5b0c894a49fbea7829f2e6cba5214230f4ee70978a6a87ce397
Static task
static1
Behavioral task
behavioral1
Sample
B06.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
B06.exe
Resource
win10v20210408
Malware Config
Targets
-
-
Target
B06.exe
-
Size
4.5MB
-
MD5
49fb0e5a3415155c24d6839250cd7fed
-
SHA1
69fa4c797df21b98740368c268cfd1919bf4a6e0
-
SHA256
f2a155473c06ecad973676f1e2a8d228ab4a8adf32a87477c716f31fddf6cbaf
-
SHA512
4bcf713b36e0c0bd1e12018cc835a988dbbb2d54556531ebddf97435fd430dab0393fe55e16de5b0c894a49fbea7829f2e6cba5214230f4ee70978a6a87ce397
-
MedusaLocker Payload
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Deletes itself
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-