General
-
Target
7e0ea386a2070051c3a05ed4115a6c99d5b626ba328be7f171ab74ba2f6589cc
-
Size
678KB
-
Sample
220305-smbyrageg8
-
MD5
6e93e386a9d39efe3033bea964f20353
-
SHA1
c3069630d1ace693e65fe5a9394a06c415ff4049
-
SHA256
7e0ea386a2070051c3a05ed4115a6c99d5b626ba328be7f171ab74ba2f6589cc
-
SHA512
62dac0e9c3c92cdfafe3f27c73ad2277af4b14adeac8334c1f6c7d3346b30b10889d2d5f6c4216427a7cfaa7a2d9ed7aa57d5ea9336fea2110acbcef9daa72a4
Static task
static1
Behavioral task
behavioral1
Sample
7e0ea386a2070051c3a05ed4115a6c99d5b626ba328be7f171ab74ba2f6589cc.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
7e0ea386a2070051c3a05ed4115a6c99d5b626ba328be7f171ab74ba2f6589cc.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Recovery_Instructions.html
href="mailto:[email protected]">[email protected]</a>
Extracted
C:\Recovery_Instructions.html
href="mailto:[email protected]">[email protected]</a>
Targets
-
-
Target
7e0ea386a2070051c3a05ed4115a6c99d5b626ba328be7f171ab74ba2f6589cc
-
Size
678KB
-
MD5
6e93e386a9d39efe3033bea964f20353
-
SHA1
c3069630d1ace693e65fe5a9394a06c415ff4049
-
SHA256
7e0ea386a2070051c3a05ed4115a6c99d5b626ba328be7f171ab74ba2f6589cc
-
SHA512
62dac0e9c3c92cdfafe3f27c73ad2277af4b14adeac8334c1f6c7d3346b30b10889d2d5f6c4216427a7cfaa7a2d9ed7aa57d5ea9336fea2110acbcef9daa72a4
-
MedusaLocker Payload
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-