General
-
Target
c632ce1dc34111c66efb817f608bf3b547fc9df5fed478d736b4c53a41ba193e
-
Size
669KB
-
Sample
220201-swzfeahaf9
-
MD5
187c968c9c7f70a8c65ebefac8e4f124
-
SHA1
b5ec574920e42f117024e60852968da4f0584ff0
-
SHA256
c632ce1dc34111c66efb817f608bf3b547fc9df5fed478d736b4c53a41ba193e
-
SHA512
f4d21feb6518d2712e829f5b3e8209b76851ab7ae66e2673fef08545f085bf3ece191b37bcce14074eb2c3fc50de83339ac9bee92769a20b94886289554fa3f6
Static task
static1
Behavioral task
behavioral1
Sample
c632ce1dc34111c66efb817f608bf3b547fc9df5fed478d736b4c53a41ba193e.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
c632ce1dc34111c66efb817f608bf3b547fc9df5fed478d736b4c53a41ba193e.exe
Resource
win10v2004-en-20220113
Malware Config
Targets
-
-
Target
c632ce1dc34111c66efb817f608bf3b547fc9df5fed478d736b4c53a41ba193e
-
Size
669KB
-
MD5
187c968c9c7f70a8c65ebefac8e4f124
-
SHA1
b5ec574920e42f117024e60852968da4f0584ff0
-
SHA256
c632ce1dc34111c66efb817f608bf3b547fc9df5fed478d736b4c53a41ba193e
-
SHA512
f4d21feb6518d2712e829f5b3e8209b76851ab7ae66e2673fef08545f085bf3ece191b37bcce14074eb2c3fc50de83339ac9bee92769a20b94886289554fa3f6
-
MedusaLocker Payload
-
Executes dropped EXE
-
Sets service image path in registry
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-