General
-
Target
dce7e1f59fa13d329154b3101c9f0ade725a5d799116fcc58f12682c91d2edba
-
Size
669KB
-
Sample
220201-stwxhahac9
-
MD5
7f80e4ae509570c739fb4e144b7fdce8
-
SHA1
43d17c2de786e2865a9cbc8358a380c9ee2d3684
-
SHA256
dce7e1f59fa13d329154b3101c9f0ade725a5d799116fcc58f12682c91d2edba
-
SHA512
598b6d6af00cc56b208bfbfff4114f4dab6295a344e2ade6544290e237e5054775656be37dde3dce52ed86379851de59315a125c95707235e566d2fab8dcf590
Static task
static1
Behavioral task
behavioral1
Sample
dce7e1f59fa13d329154b3101c9f0ade725a5d799116fcc58f12682c91d2edba.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
dce7e1f59fa13d329154b3101c9f0ade725a5d799116fcc58f12682c91d2edba.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
\??\Z:\Boot\HOW_TO_RECOVER_DATA.html
Extracted
C:\HOW_TO_RECOVER_DATA.html
Targets
-
-
Target
dce7e1f59fa13d329154b3101c9f0ade725a5d799116fcc58f12682c91d2edba
-
Size
669KB
-
MD5
7f80e4ae509570c739fb4e144b7fdce8
-
SHA1
43d17c2de786e2865a9cbc8358a380c9ee2d3684
-
SHA256
dce7e1f59fa13d329154b3101c9f0ade725a5d799116fcc58f12682c91d2edba
-
SHA512
598b6d6af00cc56b208bfbfff4114f4dab6295a344e2ade6544290e237e5054775656be37dde3dce52ed86379851de59315a125c95707235e566d2fab8dcf590
Score10/10-
MedusaLocker Payload
-
Executes dropped EXE
-
Sets service image path in registry
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-