General
-
Target
fc0f65213e7ad5960378433efc55642c116c750e10cb881ed7297f361b6be7dd.exe
-
Size
669KB
-
Sample
221211-28x8jshh92
-
MD5
489e246b8f55137cd70e4b2d718ff85f
-
SHA1
444e3fd11ac385ab333db41420e5c4fd2e47a5ba
-
SHA256
fc0f65213e7ad5960378433efc55642c116c750e10cb881ed7297f361b6be7dd
-
SHA512
25301655af73d40156d5761883198e519887d6dd24c282602a43cba8d029e108a26a29fa9b99e80c559a2916e311a6726dfbe8ef43c75dac503a3d33fa8464f7
-
SSDEEP
12288:dQA0FfTcwpBuV2UxqDmuiLZeUaoFi2XZWfGe615HhAZV8DRKD/KeX:Tuf4wTuV2Ux3uIZeUBi2Te6HWMKrKe
Behavioral task
behavioral1
Sample
fc0f65213e7ad5960378433efc55642c116c750e10cb881ed7297f361b6be7dd.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fc0f65213e7ad5960378433efc55642c116c750e10cb881ed7297f361b6be7dd.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\how_to_back_files.html
Extracted
C:\how_to_back_files.html
Targets
-
-
Target
fc0f65213e7ad5960378433efc55642c116c750e10cb881ed7297f361b6be7dd.exe
-
Size
669KB
-
MD5
489e246b8f55137cd70e4b2d718ff85f
-
SHA1
444e3fd11ac385ab333db41420e5c4fd2e47a5ba
-
SHA256
fc0f65213e7ad5960378433efc55642c116c750e10cb881ed7297f361b6be7dd
-
SHA512
25301655af73d40156d5761883198e519887d6dd24c282602a43cba8d029e108a26a29fa9b99e80c559a2916e311a6726dfbe8ef43c75dac503a3d33fa8464f7
-
SSDEEP
12288:dQA0FfTcwpBuV2UxqDmuiLZeUaoFi2XZWfGe615HhAZV8DRKD/KeX:Tuf4wTuV2Ux3uIZeUBi2Te6HWMKrKe
-
MedusaLocker payload
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-