Behavioral task
behavioral1
Sample
e89cea4d336dd9896fe0e7b72636ec0d9caa861cff329d7ac3d4f3149a7e237f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e89cea4d336dd9896fe0e7b72636ec0d9caa861cff329d7ac3d4f3149a7e237f.exe
Resource
win10v2004-20220812-en
General
-
Target
e89cea4d336dd9896fe0e7b72636ec0d9caa861cff329d7ac3d4f3149a7e237f.exe
-
Size
654KB
-
MD5
12ade3a9d6c79998d609cf5838a13676
-
SHA1
5f105c1f45ea4bdf6ca6654bd8bd1b25e38264f8
-
SHA256
e89cea4d336dd9896fe0e7b72636ec0d9caa861cff329d7ac3d4f3149a7e237f
-
SHA512
56213bf07c6c837c836c097a849bc87f50507fc5067debc08ae613df3b77be68e23864265a674d23fe8e5a2fb2b5a538322ead894fec7885da262667ea27315b
-
SSDEEP
12288:JPHoASnPvRFnfvfa+usAQxMaIBWMnoCniHZkMCWueaYhX0knOde/uwKmQJXuVGkM:JPHoASnPvRFnfK+hAQxnIBWMCkTIa6X5
Malware Config
Signatures
-
MedusaLocker payload 1 IoCs
Processes:
resource yara_rule sample family_medusalocker -
Medusalocker family
Files
-
e89cea4d336dd9896fe0e7b72636ec0d9caa861cff329d7ac3d4f3149a7e237f.exe