General
-
Target
fc12de55f162cd0645e6f7299f6160d1a3b4c3a665efaf4f8bd891d8139d159e
-
Size
678KB
-
Sample
220201-srlnraghg9
-
MD5
7405efcdd3e931cde430317df1c00131
-
SHA1
69c1527fbd840eee87821328ecf1453984ddc73e
-
SHA256
fc12de55f162cd0645e6f7299f6160d1a3b4c3a665efaf4f8bd891d8139d159e
-
SHA512
a54442e4ceb718491486653634640dfcfb79c535fde92b7234fbca328c6aeb1cc9b552ae16fe557055eb52ad0ef20e30a5caedd94dd3d89ea647fc4430e48d72
Static task
static1
Behavioral task
behavioral1
Sample
fc12de55f162cd0645e6f7299f6160d1a3b4c3a665efaf4f8bd891d8139d159e.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
fc12de55f162cd0645e6f7299f6160d1a3b4c3a665efaf4f8bd891d8139d159e.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Recovery_Instructions.html
Extracted
C:\Recovery_Instructions.html
Targets
-
-
Target
fc12de55f162cd0645e6f7299f6160d1a3b4c3a665efaf4f8bd891d8139d159e
-
Size
678KB
-
MD5
7405efcdd3e931cde430317df1c00131
-
SHA1
69c1527fbd840eee87821328ecf1453984ddc73e
-
SHA256
fc12de55f162cd0645e6f7299f6160d1a3b4c3a665efaf4f8bd891d8139d159e
-
SHA512
a54442e4ceb718491486653634640dfcfb79c535fde92b7234fbca328c6aeb1cc9b552ae16fe557055eb52ad0ef20e30a5caedd94dd3d89ea647fc4430e48d72
Score10/10-
MedusaLocker Payload
-
Executes dropped EXE
-
Sets service image path in registry
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-