General
-
Target
66a13e8102f809e23e0ad0ba88ced5eecfa319797c9f709d090994a7143d858a
-
Size
669KB
-
Sample
220408-mw82yscdg7
-
MD5
81276225b26444e9ff7287392b66c0da
-
SHA1
d523010e32ea34d5b56809321b84a6c14387c9d2
-
SHA256
66a13e8102f809e23e0ad0ba88ced5eecfa319797c9f709d090994a7143d858a
-
SHA512
69ca15f27b75788d61e6b086c4949e65c9651a59970de0f9bab87851e19d01378be250e5be2632ca3150980f3e4f4ba3199999eb40021c073805d968c604f05c
Static task
static1
Behavioral task
behavioral1
Sample
66a13e8102f809e23e0ad0ba88ced5eecfa319797c9f709d090994a7143d858a.exe
Resource
win7-20220331-en
Behavioral task
behavioral2
Sample
66a13e8102f809e23e0ad0ba88ced5eecfa319797c9f709d090994a7143d858a.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\HOW_TO_RECOVER_DATA.html
Extracted
C:\HOW_TO_RECOVER_DATA.html
Targets
-
-
Target
66a13e8102f809e23e0ad0ba88ced5eecfa319797c9f709d090994a7143d858a
-
Size
669KB
-
MD5
81276225b26444e9ff7287392b66c0da
-
SHA1
d523010e32ea34d5b56809321b84a6c14387c9d2
-
SHA256
66a13e8102f809e23e0ad0ba88ced5eecfa319797c9f709d090994a7143d858a
-
SHA512
69ca15f27b75788d61e6b086c4949e65c9651a59970de0f9bab87851e19d01378be250e5be2632ca3150980f3e4f4ba3199999eb40021c073805d968c604f05c
-
MedusaLocker Payload
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-