General
-
Target
1e9ad19e577e8b44b77119c4e1bf842b513c813e4dc4d92b494c58b1478f01de
-
Size
678KB
-
Sample
220201-s96rmshacm
-
MD5
7e3a815830adf98eaed4b5289dcb5dae
-
SHA1
4948c8419d64a342242b8765ab443fbdee63c95f
-
SHA256
1e9ad19e577e8b44b77119c4e1bf842b513c813e4dc4d92b494c58b1478f01de
-
SHA512
9f1347e33e67595d9d7506686f92cd6963e7c161e7c9300fdaddc2488ae763911914bfab3eaaa49e9887890eb6568c6ba46c152fcc8349259584531ef9fe638d
Static task
static1
Behavioral task
behavioral1
Sample
1e9ad19e577e8b44b77119c4e1bf842b513c813e4dc4d92b494c58b1478f01de.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
1e9ad19e577e8b44b77119c4e1bf842b513c813e4dc4d92b494c58b1478f01de.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
\??\Z:\Boot\Recovery_Instructions.html
Extracted
C:\Recovery_Instructions.html
Targets
-
-
Target
1e9ad19e577e8b44b77119c4e1bf842b513c813e4dc4d92b494c58b1478f01de
-
Size
678KB
-
MD5
7e3a815830adf98eaed4b5289dcb5dae
-
SHA1
4948c8419d64a342242b8765ab443fbdee63c95f
-
SHA256
1e9ad19e577e8b44b77119c4e1bf842b513c813e4dc4d92b494c58b1478f01de
-
SHA512
9f1347e33e67595d9d7506686f92cd6963e7c161e7c9300fdaddc2488ae763911914bfab3eaaa49e9887890eb6568c6ba46c152fcc8349259584531ef9fe638d
-
MedusaLocker Payload
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-