General
-
Target
88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f
-
Size
678KB
-
Sample
220306-ezc5paaaa6
-
MD5
c627f3efbd8ac9d105bbbbabede03292
-
SHA1
6da7954690a43c7355b494f069afab03c41f2550
-
SHA256
88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f
-
SHA512
80c569c83412f4ed8257de33eb5b77d0cc2e046c8c9a3dd1ff4404cc2f6309a0cf2f1cb1cb0bef13e445d9f2ab94a864225375d1c11156d52b859bbfa041cc7b
Static task
static1
Behavioral task
behavioral1
Sample
88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
\??\Z:\Boot\Recovery_Instructions.html
Extracted
C:\Recovery_Instructions.html
Targets
-
-
Target
88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f
-
Size
678KB
-
MD5
c627f3efbd8ac9d105bbbbabede03292
-
SHA1
6da7954690a43c7355b494f069afab03c41f2550
-
SHA256
88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f
-
SHA512
80c569c83412f4ed8257de33eb5b77d0cc2e046c8c9a3dd1ff4404cc2f6309a0cf2f1cb1cb0bef13e445d9f2ab94a864225375d1c11156d52b859bbfa041cc7b
-
MedusaLocker Payload
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-