General
-
Target
a.zip
-
Size
1.1MB
-
Sample
211020-lnlq1sgha9
-
MD5
05bda4bb2537515927645759f4492004
-
SHA1
fe892cd96ac631a15b9cbc93acfee9bb857ff4c5
-
SHA256
34601e5edf184f46c37314559e0a361cbce3aadc451e09f8b84020232fa710ad
-
SHA512
b0e5708bf3c9fdc7cbb137985f6766b2c654de790fc909d0785a94101640dcd1628414b9fc71f58682ebd4a8736358b6218a1597be57bd27595e48e54dee9b29
Static task
static1
Behavioral task
behavioral1
Sample
B.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
B.exe
Resource
win10-en-20210920
Behavioral task
behavioral3
Sample
Build.exe
Resource
win7-en-20211014
Behavioral task
behavioral4
Sample
Build.exe
Resource
win10-en-20210920
Behavioral task
behavioral5
Sample
READ.exe
Resource
win7-en-20211014
Behavioral task
behavioral6
Sample
READ.exe
Resource
win10-en-20210920
Behavioral task
behavioral7
Sample
rb.exe
Resource
win7-en-20211014
Behavioral task
behavioral8
Sample
rb.exe
Resource
win10-en-20210920
Malware Config
Extracted
\??\Z:\Boot\HOW_TO_RECOVER_DATA.html
Extracted
C:\Boot\HOW_TO_RECOVER_DATA.html
Extracted
\??\Z:\Boot\HOW_TO_RECOVER_DATA.html
Extracted
C:\Boot\HOW_TO_RECOVER_DATA.html
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\HOW_TO_RECOVER_DATA.html
Extracted
C:\Boot\HOW_TO_RECOVER_DATA.html
Extracted
\??\Z:\Boot\HOW_TO_RECOVER_DATA.html
Extracted
C:\Boot\HOW_TO_RECOVER_DATA.html
Targets
-
-
Target
B.exe
-
Size
669KB
-
MD5
c17b2c3980926b02136c0a5fb5dfdaa3
-
SHA1
938eb1b7f1d985d134957443d4c43ad551727b89
-
SHA256
4d2b250eb1691bd116eb0004a6b4526afe62631551d6d31d4da482ab5ec3b021
-
SHA512
f770b1dfd74e58ff9d67f0e91ac070e92251598efc45863acf827098cc52f2868c7e2698fd5b0a3a178ea1d1446d32882dfd0601526dbfb27df1251d76c5881b
-
MedusaLocker Payload
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
-
-
Target
Build.exe
-
Size
669KB
-
MD5
b446b1c86f3d27bb39783f9d3a112a40
-
SHA1
d9f66f8db27686f4f3b2c7d17557c84077ac801f
-
SHA256
1f5eefc1feb47e11e53f82055ca0921fc1b1299dffa7972c6faeff1904fdad1d
-
SHA512
c2b7682c265060c1c62be0b4dceba7fed6882b9fdc9cbbd1d379608a482bf215d81a2a3c03cc2df709bc936ee7d06ff1250dde92808bd0e0d1f1ee3410c35d9a
-
MedusaLocker Payload
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
-
-
Target
READ.exe
-
Size
669KB
-
MD5
5ec29d96f5fefb2d726f9e120786eaa9
-
SHA1
3f8d050bd4e823b1f2c681856d1ae6d9007d5861
-
SHA256
8ee1f51602f957fa82c7e9c0d834d28873307a0c576ab8c7cc99ca85fcf43b2e
-
SHA512
e21682f2bfee29cd0c0765a10463b2f57bde5996fa367ee2b8b6f7fae9bf5703aec24319ddf2e33890b352331f8fedda41d79ff04ec8a881a6469f6bdba0d5ff
-
MedusaLocker Payload
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
-
-
Target
rb.exe
-
Size
669KB
-
MD5
ae286ff258c5ec1d15a4fd3f64875d5b
-
SHA1
576b9e76e385b389f859ee4bde2d12776bbaedca
-
SHA256
ce0facb2c24c71a20117e27af3aed9d6815500eeadba6e79b472bef539d82769
-
SHA512
f2cf299e20571701ab7a7ad82103317279e8378f114e3de76b22580eb5e8263a025af1fb653b27323645e0ac63983dcbf6f609154a16e8e9d6c81531c369183b
-
MedusaLocker Payload
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-