General
-
Target
54b8ca90cd5c6b8053a612d2e8d99bf05f427b36e7fccc0f63427e1f386db186.exe
-
Size
669KB
-
Sample
220927-kta12aebap
-
MD5
3981aa980e34be2f97b9f29bd5e98bdd
-
SHA1
adb6470c8d918e772fbc590aa3850cd9e214f783
-
SHA256
54b8ca90cd5c6b8053a612d2e8d99bf05f427b36e7fccc0f63427e1f386db186
-
SHA512
b147389eaf789647b74a924875b14ab813e322e2a1a8a5b8366fa1805bf1c71631f7cf4179475c4e9a2826f7038c0d96793f7daa545808eb4d20b1c23ab18685
-
SSDEEP
12288:dQA0FfTcwpBuV2UxqDmuiLZeUaoFi2XZWfGe615HhAZV8DXKD/KeX:Tuf4wTuV2Ux3uIZeUBi2Te6HWCKrKe
Behavioral task
behavioral1
Sample
54b8ca90cd5c6b8053a612d2e8d99bf05f427b36e7fccc0f63427e1f386db186.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
54b8ca90cd5c6b8053a612d2e8d99bf05f427b36e7fccc0f63427e1f386db186.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\how_to_back_files.html
Extracted
C:\how_to_back_files.html
Targets
-
-
Target
54b8ca90cd5c6b8053a612d2e8d99bf05f427b36e7fccc0f63427e1f386db186.exe
-
Size
669KB
-
MD5
3981aa980e34be2f97b9f29bd5e98bdd
-
SHA1
adb6470c8d918e772fbc590aa3850cd9e214f783
-
SHA256
54b8ca90cd5c6b8053a612d2e8d99bf05f427b36e7fccc0f63427e1f386db186
-
SHA512
b147389eaf789647b74a924875b14ab813e322e2a1a8a5b8366fa1805bf1c71631f7cf4179475c4e9a2826f7038c0d96793f7daa545808eb4d20b1c23ab18685
-
SSDEEP
12288:dQA0FfTcwpBuV2UxqDmuiLZeUaoFi2XZWfGe615HhAZV8DXKD/KeX:Tuf4wTuV2Ux3uIZeUBi2Te6HWCKrKe
-
MedusaLocker payload
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-