General
-
Target
f0164ac8d78b8c4323fb37b1382a9f3ed21228433640380b8d591a5074375e70
-
Size
669KB
-
Sample
220201-ssg2ysghh9
-
MD5
f9e4a20f4929036d88515d002e30afa5
-
SHA1
2bbe0b37255ed638e5ae3a0d2e586dbadb8416bc
-
SHA256
f0164ac8d78b8c4323fb37b1382a9f3ed21228433640380b8d591a5074375e70
-
SHA512
5efea74d735df55a4a7bb9bd921209d0c2def8ed9db21deecf7c625ad05b0ec1d27fb0134985d0497b66ab93ad59b1edd3fa0489db02ddd47b82559e5f5cd798
Static task
static1
Behavioral task
behavioral1
Sample
f0164ac8d78b8c4323fb37b1382a9f3ed21228433640380b8d591a5074375e70.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
f0164ac8d78b8c4323fb37b1382a9f3ed21228433640380b8d591a5074375e70.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
\??\Z:\Boot\HOW_TO_RECOVER_DATA.html
Extracted
C:\HOW_TO_RECOVER_DATA.html
Targets
-
-
Target
f0164ac8d78b8c4323fb37b1382a9f3ed21228433640380b8d591a5074375e70
-
Size
669KB
-
MD5
f9e4a20f4929036d88515d002e30afa5
-
SHA1
2bbe0b37255ed638e5ae3a0d2e586dbadb8416bc
-
SHA256
f0164ac8d78b8c4323fb37b1382a9f3ed21228433640380b8d591a5074375e70
-
SHA512
5efea74d735df55a4a7bb9bd921209d0c2def8ed9db21deecf7c625ad05b0ec1d27fb0134985d0497b66ab93ad59b1edd3fa0489db02ddd47b82559e5f5cd798
Score10/10-
MedusaLocker Payload
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-