General
-
Target
ddca9b2f9b4c20faad500e19ba74c8d478c5be02596e9b1ff5a26ef4396bcd59
-
Size
669KB
-
Sample
220201-strb1shac7
-
MD5
4b5c296cf0ead00608c1b45998ad4765
-
SHA1
68a30a1fda9a3f4c978d921604e11ba9584b99e3
-
SHA256
ddca9b2f9b4c20faad500e19ba74c8d478c5be02596e9b1ff5a26ef4396bcd59
-
SHA512
43cad6af322370b8f4e2af8e56fe6a42defef571afc155359a945497d3bfd2d8bee7500559e8b0100d7979b32d51b80f2c80332d451c5b2e4a91df6d70868031
Static task
static1
Behavioral task
behavioral1
Sample
ddca9b2f9b4c20faad500e19ba74c8d478c5be02596e9b1ff5a26ef4396bcd59.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
ddca9b2f9b4c20faad500e19ba74c8d478c5be02596e9b1ff5a26ef4396bcd59.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
\??\Z:\Boot\HOW_TO_RECOVER_DATA.html
Extracted
\??\Z:\Boot\HOW_TO_RECOVER_DATA.html
Targets
-
-
Target
ddca9b2f9b4c20faad500e19ba74c8d478c5be02596e9b1ff5a26ef4396bcd59
-
Size
669KB
-
MD5
4b5c296cf0ead00608c1b45998ad4765
-
SHA1
68a30a1fda9a3f4c978d921604e11ba9584b99e3
-
SHA256
ddca9b2f9b4c20faad500e19ba74c8d478c5be02596e9b1ff5a26ef4396bcd59
-
SHA512
43cad6af322370b8f4e2af8e56fe6a42defef571afc155359a945497d3bfd2d8bee7500559e8b0100d7979b32d51b80f2c80332d451c5b2e4a91df6d70868031
Score10/10-
MedusaLocker Payload
-
Executes dropped EXE
-
Sets service image path in registry
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-