General
-
Target
e27a14af114438250721bfe21505ed32d78d4b03bd1365a39adfccd0394f5fe8
-
Size
669KB
-
Sample
220201-stecfshac2
-
MD5
1f3548a95dc40f450f7188c943e568d9
-
SHA1
d5b46eb0c5315518b7f5dc35b5293e1d5256b7f0
-
SHA256
e27a14af114438250721bfe21505ed32d78d4b03bd1365a39adfccd0394f5fe8
-
SHA512
8d07e51439e057265a0caa39c0ce358ede6f9ba0eb3f8c063d1a3f0a575749fb5453f2c3ba83748ca6b86d0ff30fe3f1139cfdabaeec7aa81bf92694e30c277e
Static task
static1
Behavioral task
behavioral1
Sample
e27a14af114438250721bfe21505ed32d78d4b03bd1365a39adfccd0394f5fe8.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
e27a14af114438250721bfe21505ed32d78d4b03bd1365a39adfccd0394f5fe8.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
\??\Z:\Boot\HOW_TO_RECOVER_DATA.html
Extracted
C:\HOW_TO_RECOVER_DATA.html
Targets
-
-
Target
e27a14af114438250721bfe21505ed32d78d4b03bd1365a39adfccd0394f5fe8
-
Size
669KB
-
MD5
1f3548a95dc40f450f7188c943e568d9
-
SHA1
d5b46eb0c5315518b7f5dc35b5293e1d5256b7f0
-
SHA256
e27a14af114438250721bfe21505ed32d78d4b03bd1365a39adfccd0394f5fe8
-
SHA512
8d07e51439e057265a0caa39c0ce358ede6f9ba0eb3f8c063d1a3f0a575749fb5453f2c3ba83748ca6b86d0ff30fe3f1139cfdabaeec7aa81bf92694e30c277e
Score10/10-
MedusaLocker Payload
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-