General
-
Target
7a073ba748c752fa795254cb4019c282ef03a0283602a43f5481a49d17323152
-
Size
669KB
-
Sample
221014-rnewcsdeh4
-
MD5
a65e340a616178bceb72e056554ca8d6
-
SHA1
00f95a3e9e1ce53e4476c770e61f08c110d3beae
-
SHA256
7a073ba748c752fa795254cb4019c282ef03a0283602a43f5481a49d17323152
-
SHA512
cd3f6baa05dbd5b8d345c5a7c084eb389ca1b2e9d6cfc212f58742e5a943927dbb4ae8d16f7fe12bee315cc4e3b8ec11916513e2ff0538af6b8848bbbd21e720
-
SSDEEP
12288:dQA0FfTcwpBuV2UxqDmuiLZeUaoFi2XZWfGe615HhAZV8DiKD/KeX:Tuf4wTuV2Ux3uIZeUBi2Te6HW7KrKe
Behavioral task
behavioral1
Sample
7a073ba748c752fa795254cb4019c282ef03a0283602a43f5481a49d17323152.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7a073ba748c752fa795254cb4019c282ef03a0283602a43f5481a49d17323152.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\HOW_TO_RECOVER_DATA.html
Extracted
C:\HOW_TO_RECOVER_DATA.html
Targets
-
-
Target
7a073ba748c752fa795254cb4019c282ef03a0283602a43f5481a49d17323152
-
Size
669KB
-
MD5
a65e340a616178bceb72e056554ca8d6
-
SHA1
00f95a3e9e1ce53e4476c770e61f08c110d3beae
-
SHA256
7a073ba748c752fa795254cb4019c282ef03a0283602a43f5481a49d17323152
-
SHA512
cd3f6baa05dbd5b8d345c5a7c084eb389ca1b2e9d6cfc212f58742e5a943927dbb4ae8d16f7fe12bee315cc4e3b8ec11916513e2ff0538af6b8848bbbd21e720
-
SSDEEP
12288:dQA0FfTcwpBuV2UxqDmuiLZeUaoFi2XZWfGe615HhAZV8DiKD/KeX:Tuf4wTuV2Ux3uIZeUBi2Te6HW7KrKe
-
MedusaLocker payload
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-