General
-
Target
8e32be81036161928f5bf24d75335bda797ca91dee0730c9c1b62d88f9c24f29
-
Size
678KB
-
Sample
220306-hmlsvaacb2
-
MD5
cd5e831586e171b130dd719e73e13f62
-
SHA1
baf8da95632066364ff74df394bc2979c49e1993
-
SHA256
8e32be81036161928f5bf24d75335bda797ca91dee0730c9c1b62d88f9c24f29
-
SHA512
f4d615a45d45b3630c9d2840dec3cd710d3dcb68ed60e74248e0026c99c62f4c3fbb2ae2b354d6492cc2b18c1b6cbc6eea8137100a42d591b07d191184f33ee0
Static task
static1
Behavioral task
behavioral1
Sample
8e32be81036161928f5bf24d75335bda797ca91dee0730c9c1b62d88f9c24f29.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
8e32be81036161928f5bf24d75335bda797ca91dee0730c9c1b62d88f9c24f29.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Recovery_Instructions.html
Extracted
C:\Recovery_Instructions.html
Targets
-
-
Target
8e32be81036161928f5bf24d75335bda797ca91dee0730c9c1b62d88f9c24f29
-
Size
678KB
-
MD5
cd5e831586e171b130dd719e73e13f62
-
SHA1
baf8da95632066364ff74df394bc2979c49e1993
-
SHA256
8e32be81036161928f5bf24d75335bda797ca91dee0730c9c1b62d88f9c24f29
-
SHA512
f4d615a45d45b3630c9d2840dec3cd710d3dcb68ed60e74248e0026c99c62f4c3fbb2ae2b354d6492cc2b18c1b6cbc6eea8137100a42d591b07d191184f33ee0
-
MedusaLocker Payload
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-