General
-
Target
bbb4df0135a68363dce20e59c6fbbdecc2ea4e60639f27cb057ee3ee677b241c
-
Size
678KB
-
Sample
220201-sxlwpsgfel
-
MD5
c4cf890a24a54474ebae16d5afd3a3f7
-
SHA1
8f2882c2e29fcc28576eab0597512a1aaa336b7f
-
SHA256
bbb4df0135a68363dce20e59c6fbbdecc2ea4e60639f27cb057ee3ee677b241c
-
SHA512
3c72cb433c6e6ca5631635452f11e02473e1c9bf208b9dca7501bde2dc8dfe4cbb5660df43f05b21681e5493a7b1472639ced2c793f60f563335d24ec0ddc4af
Static task
static1
Behavioral task
behavioral1
Sample
bbb4df0135a68363dce20e59c6fbbdecc2ea4e60639f27cb057ee3ee677b241c.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
bbb4df0135a68363dce20e59c6fbbdecc2ea4e60639f27cb057ee3ee677b241c.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Recovery_Instructions.html
href="mailto:[email protected]">[email protected]</a>
Targets
-
-
Target
bbb4df0135a68363dce20e59c6fbbdecc2ea4e60639f27cb057ee3ee677b241c
-
Size
678KB
-
MD5
c4cf890a24a54474ebae16d5afd3a3f7
-
SHA1
8f2882c2e29fcc28576eab0597512a1aaa336b7f
-
SHA256
bbb4df0135a68363dce20e59c6fbbdecc2ea4e60639f27cb057ee3ee677b241c
-
SHA512
3c72cb433c6e6ca5631635452f11e02473e1c9bf208b9dca7501bde2dc8dfe4cbb5660df43f05b21681e5493a7b1472639ced2c793f60f563335d24ec0ddc4af
-
MedusaLocker Payload
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-