General
-
Target
ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387
-
Size
669KB
-
Sample
221005-d1tndsdear
-
MD5
cfa482b23fa7a59641a6b816d56a3c58
-
SHA1
0cd9753113e29fd460dcdcffb21f364b3c5a14aa
-
SHA256
ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387
-
SHA512
c13bb3b4463cffd39fc556fd5e0d4286a4da6eb04cbbf5d20675d819085a07dc7f616f586e30eeaea285ca81fb89acae56124fdd3f19dba5a7eca1fec9b8d9c7
-
SSDEEP
12288:dQA0FfTcwpBuV2UxqDmuiLZeUaoFi2XZWfGe615HhAZV8DhKD/KeX:Tuf4wTuV2Ux3uIZeUBi2Te6HWMKrKe
Behavioral task
behavioral1
Sample
ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\how_to_back_files.html
Extracted
C:\Users\Admin\Downloads\how_to_back_files.html
medusalocker
Extracted
C:\how_to_back_files.html
Extracted
C:\Users\Admin\Desktop\how_to_back_files.html
medusalocker
Targets
-
-
Target
ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387
-
Size
669KB
-
MD5
cfa482b23fa7a59641a6b816d56a3c58
-
SHA1
0cd9753113e29fd460dcdcffb21f364b3c5a14aa
-
SHA256
ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387
-
SHA512
c13bb3b4463cffd39fc556fd5e0d4286a4da6eb04cbbf5d20675d819085a07dc7f616f586e30eeaea285ca81fb89acae56124fdd3f19dba5a7eca1fec9b8d9c7
-
SSDEEP
12288:dQA0FfTcwpBuV2UxqDmuiLZeUaoFi2XZWfGe615HhAZV8DhKD/KeX:Tuf4wTuV2Ux3uIZeUBi2Te6HWMKrKe
-
MedusaLocker payload
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-