General
-
Target
09198fa8250aef54bdc416ee2e223cc20bfcd88c5bec4aa29f815425e1744f26
-
Size
678KB
-
Sample
220201-tbee6shaem
-
MD5
0d2a9990e815349c4e6fa8573ccf5bda
-
SHA1
52326d4bff0d80a045006f1a44de0e3a8f942557
-
SHA256
09198fa8250aef54bdc416ee2e223cc20bfcd88c5bec4aa29f815425e1744f26
-
SHA512
56dec3ccd64c0a0e5bddcec166e3cafa83580146de3753ad24ce536a5cea5e55cfe1e9a1880c2030704cf8e4f2a6a1f92a62f951d479f810cea2b587e2e57f51
Static task
static1
Behavioral task
behavioral1
Sample
09198fa8250aef54bdc416ee2e223cc20bfcd88c5bec4aa29f815425e1744f26.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
09198fa8250aef54bdc416ee2e223cc20bfcd88c5bec4aa29f815425e1744f26.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Recovery_Instructions.html
Extracted
C:\Recovery_Instructions.html
Targets
-
-
Target
09198fa8250aef54bdc416ee2e223cc20bfcd88c5bec4aa29f815425e1744f26
-
Size
678KB
-
MD5
0d2a9990e815349c4e6fa8573ccf5bda
-
SHA1
52326d4bff0d80a045006f1a44de0e3a8f942557
-
SHA256
09198fa8250aef54bdc416ee2e223cc20bfcd88c5bec4aa29f815425e1744f26
-
SHA512
56dec3ccd64c0a0e5bddcec166e3cafa83580146de3753ad24ce536a5cea5e55cfe1e9a1880c2030704cf8e4f2a6a1f92a62f951d479f810cea2b587e2e57f51
-
MedusaLocker Payload
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Sets service image path in registry
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-