General

  • Target

    6cd8d4ae87a7c260ea6e16403fa761281d3073f466cc0217951d978c17020d2a

  • Size

    669KB

  • Sample

    221029-j8kckshgbl

  • MD5

    87fc357cfaa43f6766a5efef072871bc

  • SHA1

    ab77612d19ab9ec9f3bff9f13bf18cffc82799a7

  • SHA256

    6cd8d4ae87a7c260ea6e16403fa761281d3073f466cc0217951d978c17020d2a

  • SHA512

    2fbe4934c1d5485d12d4a395668778e765de66ec44afd06f8d702427dac7f8de13f4b3f954ef95f7f5cb27f6bc8f1db4933b56babfa6bab1575a66dfede5c436

  • SSDEEP

    12288:dQA0FfTcwpBuV2UxqDmuiLZeUaoFi2XZWfGe615HhAZV8DhKD/KeX:Tuf4wTuV2Ux3uIZeUBi2Te6HWIKrKe

Malware Config

Targets

    • Target

      6cd8d4ae87a7c260ea6e16403fa761281d3073f466cc0217951d978c17020d2a

    • Size

      669KB

    • MD5

      87fc357cfaa43f6766a5efef072871bc

    • SHA1

      ab77612d19ab9ec9f3bff9f13bf18cffc82799a7

    • SHA256

      6cd8d4ae87a7c260ea6e16403fa761281d3073f466cc0217951d978c17020d2a

    • SHA512

      2fbe4934c1d5485d12d4a395668778e765de66ec44afd06f8d702427dac7f8de13f4b3f954ef95f7f5cb27f6bc8f1db4933b56babfa6bab1575a66dfede5c436

    • SSDEEP

      12288:dQA0FfTcwpBuV2UxqDmuiLZeUaoFi2XZWfGe615HhAZV8DhKD/KeX:Tuf4wTuV2Ux3uIZeUBi2Te6HWIKrKe

    • MedusaLocker

      Ransomware with several variants first seen in September 2019.

    • MedusaLocker payload

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Executes dropped EXE

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks