General
-
Target
fd24ff7e838fea836079c4554254768abdce32c4f46148c609a5a676c9e71103
-
Size
678KB
-
Sample
220201-srd9nsghg6
-
MD5
4984d9af56c39a161b627e019ed2604d
-
SHA1
eef59fd5b71487448bfd44270d909b1441cd537b
-
SHA256
fd24ff7e838fea836079c4554254768abdce32c4f46148c609a5a676c9e71103
-
SHA512
647917640c35888911c99a57a6c7db9164cc3739cbeebc0ad698f597ef04a34ad35b8f0e516ad3b701358e5f6bd6bf537e396b3ebacbaa3e1b5ee32b9d1e2222
Static task
static1
Behavioral task
behavioral1
Sample
fd24ff7e838fea836079c4554254768abdce32c4f46148c609a5a676c9e71103.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
fd24ff7e838fea836079c4554254768abdce32c4f46148c609a5a676c9e71103.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
\??\Z:\Boot\Recovery_Instructions.html
Extracted
C:\Recovery_Instructions.html
Targets
-
-
Target
fd24ff7e838fea836079c4554254768abdce32c4f46148c609a5a676c9e71103
-
Size
678KB
-
MD5
4984d9af56c39a161b627e019ed2604d
-
SHA1
eef59fd5b71487448bfd44270d909b1441cd537b
-
SHA256
fd24ff7e838fea836079c4554254768abdce32c4f46148c609a5a676c9e71103
-
SHA512
647917640c35888911c99a57a6c7db9164cc3739cbeebc0ad698f597ef04a34ad35b8f0e516ad3b701358e5f6bd6bf537e396b3ebacbaa3e1b5ee32b9d1e2222
-
MedusaLocker Payload
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-