General
-
Target
c79c6b680a2caa71b3ad052f60ce6da463eb576b8196bb3bbdccd003853769d4
-
Size
669KB
-
Sample
220408-mwp9vacdf7
-
MD5
87142e82f1cb0ecbcee7167ce8a183af
-
SHA1
f80b1b3435a09a6b66e0bc5188892f0790ca2faa
-
SHA256
c79c6b680a2caa71b3ad052f60ce6da463eb576b8196bb3bbdccd003853769d4
-
SHA512
ff44ab7a94ad1fbf5b773b3b8aed8fc40ad142bfe8c6b91991c0237b300ec39922f4840945e5369f70bbc673f2b0ca509d4eb0a287ef42364784e7ceec17f8fa
Static task
static1
Behavioral task
behavioral1
Sample
c79c6b680a2caa71b3ad052f60ce6da463eb576b8196bb3bbdccd003853769d4.exe
Resource
win7-20220331-en
Behavioral task
behavioral2
Sample
c79c6b680a2caa71b3ad052f60ce6da463eb576b8196bb3bbdccd003853769d4.exe
Resource
win10v2004-20220331-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\HOW_TO_RECOVER_DATA.html
Extracted
C:\HOW_TO_RECOVER_DATA.html
Targets
-
-
Target
c79c6b680a2caa71b3ad052f60ce6da463eb576b8196bb3bbdccd003853769d4
-
Size
669KB
-
MD5
87142e82f1cb0ecbcee7167ce8a183af
-
SHA1
f80b1b3435a09a6b66e0bc5188892f0790ca2faa
-
SHA256
c79c6b680a2caa71b3ad052f60ce6da463eb576b8196bb3bbdccd003853769d4
-
SHA512
ff44ab7a94ad1fbf5b773b3b8aed8fc40ad142bfe8c6b91991c0237b300ec39922f4840945e5369f70bbc673f2b0ca509d4eb0a287ef42364784e7ceec17f8fa
-
MedusaLocker Payload
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-