General
-
Target
cb12325d13acb03ad4f9977f426baf8b4688af04d4ffe23aa5f1bbd747a147c0
-
Size
669KB
-
Sample
220408-mv4e3scde6
-
MD5
effc3a4432ac7993f35d8e8239d56f26
-
SHA1
064acf069b7e319f33a36d0eb456fb5cdb9c6c94
-
SHA256
cb12325d13acb03ad4f9977f426baf8b4688af04d4ffe23aa5f1bbd747a147c0
-
SHA512
7e5fe77918d736a44e6418bede16bca1e39ccd5eed6ad0f60cbcb32f2817cff287392e29548d04eb8871671cc78b05e502a0fc59773e5589a534d92834bd339d
Static task
static1
Behavioral task
behavioral1
Sample
cb12325d13acb03ad4f9977f426baf8b4688af04d4ffe23aa5f1bbd747a147c0.exe
Resource
win7-20220331-en
Behavioral task
behavioral2
Sample
cb12325d13acb03ad4f9977f426baf8b4688af04d4ffe23aa5f1bbd747a147c0.exe
Resource
win10v2004-20220331-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\HOW_TO_RECOVER_DATA.html
Extracted
C:\HOW_TO_RECOVER_DATA.html
Targets
-
-
Target
cb12325d13acb03ad4f9977f426baf8b4688af04d4ffe23aa5f1bbd747a147c0
-
Size
669KB
-
MD5
effc3a4432ac7993f35d8e8239d56f26
-
SHA1
064acf069b7e319f33a36d0eb456fb5cdb9c6c94
-
SHA256
cb12325d13acb03ad4f9977f426baf8b4688af04d4ffe23aa5f1bbd747a147c0
-
SHA512
7e5fe77918d736a44e6418bede16bca1e39ccd5eed6ad0f60cbcb32f2817cff287392e29548d04eb8871671cc78b05e502a0fc59773e5589a534d92834bd339d
-
MedusaLocker Payload
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-