General
-
Target
e2148660af56e9fde27e26ae3db205ca2d68ef1caf968e21f498fa94d8b56ef9
-
Size
669KB
-
Sample
220201-stggtahac3
-
MD5
f3519df44f546606b256d13a209675b5
-
SHA1
e386497b7005b133226ecb7f786943f6e77641d2
-
SHA256
e2148660af56e9fde27e26ae3db205ca2d68ef1caf968e21f498fa94d8b56ef9
-
SHA512
d514809c2faaee6086713651f32d19b923275dd822d43dac4e8a1d787230342ba13c31c32080e8d5b4c0a21f456d41e75a7b07120775e305ebc17d43564c5d76
Static task
static1
Behavioral task
behavioral1
Sample
e2148660af56e9fde27e26ae3db205ca2d68ef1caf968e21f498fa94d8b56ef9.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
e2148660af56e9fde27e26ae3db205ca2d68ef1caf968e21f498fa94d8b56ef9.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
\??\Z:\Boot\HOW_TO_RECOVER_DATA.html
href="mailto:[email protected]">[email protected]</a><br>
href="mailto:[email protected]
">[email protected]</a>
Extracted
C:\HOW_TO_RECOVER_DATA.html
href="mailto:[email protected]">[email protected]</a><br>
href="mailto:[email protected]
">[email protected]</a>
Targets
-
-
Target
e2148660af56e9fde27e26ae3db205ca2d68ef1caf968e21f498fa94d8b56ef9
-
Size
669KB
-
MD5
f3519df44f546606b256d13a209675b5
-
SHA1
e386497b7005b133226ecb7f786943f6e77641d2
-
SHA256
e2148660af56e9fde27e26ae3db205ca2d68ef1caf968e21f498fa94d8b56ef9
-
SHA512
d514809c2faaee6086713651f32d19b923275dd822d43dac4e8a1d787230342ba13c31c32080e8d5b4c0a21f456d41e75a7b07120775e305ebc17d43564c5d76
Score10/10-
MedusaLocker Payload
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-