General
-
Target
fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604
-
Size
678KB
-
Sample
220201-sq9n7aghg4
-
MD5
b66384a34452aea03b6f53e0265f54e4
-
SHA1
727ecd6e6e3135c97d1d1de85f49a96f8355996d
-
SHA256
fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604
-
SHA512
51ae29b3f183171501d35383850dff4e87a2945d1f8c24aebff7035ea24f3b2507b2d2bb4532a5b71dee66fa1093722436844e5528fd47cb9f084ffde3249761
Static task
static1
Behavioral task
behavioral1
Sample
fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
\??\Z:\Boot\Recovery_Instructions.html
Extracted
\??\Z:\Boot\Recovery_Instructions.html
Targets
-
-
Target
fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604
-
Size
678KB
-
MD5
b66384a34452aea03b6f53e0265f54e4
-
SHA1
727ecd6e6e3135c97d1d1de85f49a96f8355996d
-
SHA256
fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604
-
SHA512
51ae29b3f183171501d35383850dff4e87a2945d1f8c24aebff7035ea24f3b2507b2d2bb4532a5b71dee66fa1093722436844e5528fd47cb9f084ffde3249761
-
MedusaLocker Payload
-
Executes dropped EXE
-
Sets service image path in registry
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-