General
-
Target
58a0db1ae0d7d8c5cb5db5e5a24fd1088b8029a4e51c02e7b77d400c17bcb39a
-
Size
669KB
-
Sample
220408-mw82yscdg6
-
MD5
419ee6eb592f5a59f536f28106c1a4c5
-
SHA1
da865c98e5b93f56b4e63541042740786ccc6fe9
-
SHA256
58a0db1ae0d7d8c5cb5db5e5a24fd1088b8029a4e51c02e7b77d400c17bcb39a
-
SHA512
85e469f727628ea30a3a3f775686e45b9b77bbe18516fc83be1d1b5ea1e0347d9caf59048ef9dd364f9f73696766d5b113162c2598c19301864769cb0b362199
Static task
static1
Behavioral task
behavioral1
Sample
58a0db1ae0d7d8c5cb5db5e5a24fd1088b8029a4e51c02e7b77d400c17bcb39a.exe
Resource
win7-20220331-en
Behavioral task
behavioral2
Sample
58a0db1ae0d7d8c5cb5db5e5a24fd1088b8029a4e51c02e7b77d400c17bcb39a.exe
Resource
win10v2004-20220331-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\HOW_TO_RECOVER_DATA.html
Extracted
\??\Z:\Boot\HOW_TO_RECOVER_DATA.html
Targets
-
-
Target
58a0db1ae0d7d8c5cb5db5e5a24fd1088b8029a4e51c02e7b77d400c17bcb39a
-
Size
669KB
-
MD5
419ee6eb592f5a59f536f28106c1a4c5
-
SHA1
da865c98e5b93f56b4e63541042740786ccc6fe9
-
SHA256
58a0db1ae0d7d8c5cb5db5e5a24fd1088b8029a4e51c02e7b77d400c17bcb39a
-
SHA512
85e469f727628ea30a3a3f775686e45b9b77bbe18516fc83be1d1b5ea1e0347d9caf59048ef9dd364f9f73696766d5b113162c2598c19301864769cb0b362199
-
MedusaLocker Payload
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-