General
-
Target
a3fe92224060ec183a25296999c18d4f86149649f1a701ac91b04d73e8678495
-
Size
669KB
-
Sample
220408-mw82yshdhk
-
MD5
7de20a779f98016a31f2d47a64deb30a
-
SHA1
174375f8f540cb109cb8efea1cab30fc4155869d
-
SHA256
a3fe92224060ec183a25296999c18d4f86149649f1a701ac91b04d73e8678495
-
SHA512
bd3ff7efbf91e51d51ba8cb9529587500df721d9e631322f70a760b71f1fa0d8f2fecf4d0ab5ad2162ba75ae65aa5970edf8c647cbb8272bfc04a04189d31efb
Static task
static1
Behavioral task
behavioral1
Sample
a3fe92224060ec183a25296999c18d4f86149649f1a701ac91b04d73e8678495.exe
Resource
win7-20220331-en
Behavioral task
behavioral2
Sample
a3fe92224060ec183a25296999c18d4f86149649f1a701ac91b04d73e8678495.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\HOW_TO_RECOVER_DATA.html
Extracted
C:\HOW_TO_RECOVER_DATA.html
Targets
-
-
Target
a3fe92224060ec183a25296999c18d4f86149649f1a701ac91b04d73e8678495
-
Size
669KB
-
MD5
7de20a779f98016a31f2d47a64deb30a
-
SHA1
174375f8f540cb109cb8efea1cab30fc4155869d
-
SHA256
a3fe92224060ec183a25296999c18d4f86149649f1a701ac91b04d73e8678495
-
SHA512
bd3ff7efbf91e51d51ba8cb9529587500df721d9e631322f70a760b71f1fa0d8f2fecf4d0ab5ad2162ba75ae65aa5970edf8c647cbb8272bfc04a04189d31efb
-
MedusaLocker Payload
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-