General
-
Target
19e31469f150f69bda363c8a3454113236620aa44155dbe845e7689522724b0b
-
Size
669KB
-
Sample
220408-mwnq1scdf6
-
MD5
d5d46dbdf95ca59a0f696658e186427d
-
SHA1
53f7ee66047b02198adb8907730a37bd8e0f42b8
-
SHA256
19e31469f150f69bda363c8a3454113236620aa44155dbe845e7689522724b0b
-
SHA512
7756f06a6f76dc5851dfd0f9e851b2509aa4c061c05201534a0a51363eff38eabf51eebcfd00cdd90668515318eae992b426edb93ec73197622802d56e83cb6b
Static task
static1
Behavioral task
behavioral1
Sample
19e31469f150f69bda363c8a3454113236620aa44155dbe845e7689522724b0b.exe
Resource
win7-20220331-en
Behavioral task
behavioral2
Sample
19e31469f150f69bda363c8a3454113236620aa44155dbe845e7689522724b0b.exe
Resource
win10v2004-20220331-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\HOW_TO_RECOVER_DATA.html
Extracted
C:\HOW_TO_RECOVER_DATA.html
Targets
-
-
Target
19e31469f150f69bda363c8a3454113236620aa44155dbe845e7689522724b0b
-
Size
669KB
-
MD5
d5d46dbdf95ca59a0f696658e186427d
-
SHA1
53f7ee66047b02198adb8907730a37bd8e0f42b8
-
SHA256
19e31469f150f69bda363c8a3454113236620aa44155dbe845e7689522724b0b
-
SHA512
7756f06a6f76dc5851dfd0f9e851b2509aa4c061c05201534a0a51363eff38eabf51eebcfd00cdd90668515318eae992b426edb93ec73197622802d56e83cb6b
-
MedusaLocker Payload
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-