General
-
Target
99a72b56725196298391f3d52b8536b018aa8b60d97c443161e912430079ed30
-
Size
669KB
-
Sample
220408-mwnq1shdgl
-
MD5
6b99ae925a613a56ff3f55e730f0d33c
-
SHA1
64b1a0e85bba047fc606bf1aa27e7e6d7378cb90
-
SHA256
99a72b56725196298391f3d52b8536b018aa8b60d97c443161e912430079ed30
-
SHA512
3bd3c894397818745033411143be5a7c64d97e6e3d01dd5d577c2473a3d35ce0626fc1cb10b73c95c0fd5bff79f0d4fd3857dd434e070bbb7e5687d7d141b2c9
Static task
static1
Behavioral task
behavioral1
Sample
99a72b56725196298391f3d52b8536b018aa8b60d97c443161e912430079ed30.exe
Resource
win7-20220331-en
Behavioral task
behavioral2
Sample
99a72b56725196298391f3d52b8536b018aa8b60d97c443161e912430079ed30.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\HOW_TO_RECOVER_DATA.html
Extracted
C:\HOW_TO_RECOVER_DATA.html
Targets
-
-
Target
99a72b56725196298391f3d52b8536b018aa8b60d97c443161e912430079ed30
-
Size
669KB
-
MD5
6b99ae925a613a56ff3f55e730f0d33c
-
SHA1
64b1a0e85bba047fc606bf1aa27e7e6d7378cb90
-
SHA256
99a72b56725196298391f3d52b8536b018aa8b60d97c443161e912430079ed30
-
SHA512
3bd3c894397818745033411143be5a7c64d97e6e3d01dd5d577c2473a3d35ce0626fc1cb10b73c95c0fd5bff79f0d4fd3857dd434e070bbb7e5687d7d141b2c9
-
MedusaLocker Payload
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-