General
-
Target
4552132719181824.zip
-
Size
300KB
-
Sample
211129-jqaqesegg4
-
MD5
cb9b02262dd099c2be852f80b612d9df
-
SHA1
7023a0b5d68d80b1bae3cf17745b6d3a1a830bbb
-
SHA256
45c46ce6e6c549d90e06f1ab9722e01a075153dd6b667c0e716d37bf10fe05ea
-
SHA512
33c53c1b81645043e6d54ccc92569fa2b7585228bcda13432b599bbaf74879d141cee50a6cef31317918ff669cd220d5831e57fe60e3b9bc2508eef012efad7f
Static task
static1
Behavioral task
behavioral1
Sample
46c9bed88ac58193eb8c1b2ca91cfede01a74dafa4315ff57b7d3bb0c8a779cd.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
46c9bed88ac58193eb8c1b2ca91cfede01a74dafa4315ff57b7d3bb0c8a779cd.exe
Resource
win10-en-20211104
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\HOW_TO_RECOVER_DATA.html
Extracted
C:\Boot\HOW_TO_RECOVER_DATA.html
Targets
-
-
Target
46c9bed88ac58193eb8c1b2ca91cfede01a74dafa4315ff57b7d3bb0c8a779cd
-
Size
669KB
-
MD5
f3f4909771e23ec301ae2a2c5945f25c
-
SHA1
0cbbc30d64966d7108f3404979058285d8ed250c
-
SHA256
46c9bed88ac58193eb8c1b2ca91cfede01a74dafa4315ff57b7d3bb0c8a779cd
-
SHA512
fd928762c0ddc8301092504874b0ff4ad81a65c4cd385a493db2a5dcce786bcb2f915869958a6618ba10ac443ac6af6a458fed5ec2aedc52e0c649d9d72c27ad
-
MedusaLocker Payload
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-