General
-
Target
fb07649497b39eee0a93598ff66f14a1f7625f2b6d4c30d8bb5c48de848cd4f2
-
Size
678KB
-
Sample
220201-srq88sghh2
-
MD5
217b5b689dca5aa0026401bffc8d3079
-
SHA1
86d92fc3ba2b3536893b8e753da9cbae70063a50
-
SHA256
fb07649497b39eee0a93598ff66f14a1f7625f2b6d4c30d8bb5c48de848cd4f2
-
SHA512
4da6c584cde1eb4536c5a487dc12601bef711f8b9383c5a328d2d328c87f7b0ef597627749ec17466ddaf59a296af4117a70a772202ead7406a09944a6811fe4
Static task
static1
Behavioral task
behavioral1
Sample
fb07649497b39eee0a93598ff66f14a1f7625f2b6d4c30d8bb5c48de848cd4f2.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
fb07649497b39eee0a93598ff66f14a1f7625f2b6d4c30d8bb5c48de848cd4f2.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
\??\Z:\Boot\Recovery_Instructions.html
Extracted
C:\Recovery_Instructions.html
Targets
-
-
Target
fb07649497b39eee0a93598ff66f14a1f7625f2b6d4c30d8bb5c48de848cd4f2
-
Size
678KB
-
MD5
217b5b689dca5aa0026401bffc8d3079
-
SHA1
86d92fc3ba2b3536893b8e753da9cbae70063a50
-
SHA256
fb07649497b39eee0a93598ff66f14a1f7625f2b6d4c30d8bb5c48de848cd4f2
-
SHA512
4da6c584cde1eb4536c5a487dc12601bef711f8b9383c5a328d2d328c87f7b0ef597627749ec17466ddaf59a296af4117a70a772202ead7406a09944a6811fe4
-
MedusaLocker Payload
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-