General
-
Target
9639048439.zip
-
Size
300KB
-
Sample
230320-1ebxsahd8x
-
MD5
bbab2f291532b5d94571ce1cde705a42
-
SHA1
7ec899713180631f564436d82558d9e3814fa3c8
-
SHA256
c57b9ceb171de7992bb63df37bdf176ac2efde34a2dff4bb355bb417ad34c046
-
SHA512
655e4c1c25839edd52eda7a564c9c8908cc51bd1f21f5179b5949d56b5ad40253e09bc190cbb086530149b7a29d6ed5539e096dfd8db6267d7c1339dc65d13d2
-
SSDEEP
6144:XsgET/FMKlMEuBZaxAs+NEUNIJ5hY9/6CCS5nIFVyc9pnlWV5KeQKQ/DYiTs26eW:XsDFllMNZaxAs+L3GS5IFD9pn8vKeQKj
Behavioral task
behavioral1
Sample
1658a064cb5a5681eee7ea82f92a2b7a14f70268dda3fc7aad8a610434711a8f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1658a064cb5a5681eee7ea82f92a2b7a14f70268dda3fc7aad8a610434711a8f.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\HOW_TO_RECOVER_DATA.html
Extracted
\Device\HarddiskVolume1\Boot\HOW_TO_RECOVER_DATA.html
Extracted
C:\Users\Admin\Desktop\HOW_TO_RECOVER_DATA.html
medusalocker
Targets
-
-
Target
1658a064cb5a5681eee7ea82f92a2b7a14f70268dda3fc7aad8a610434711a8f
-
Size
669KB
-
MD5
3618b68d7db4614ec8d33b5052cc0e85
-
SHA1
15177fbb65d707b308bac50f612b795494314001
-
SHA256
1658a064cb5a5681eee7ea82f92a2b7a14f70268dda3fc7aad8a610434711a8f
-
SHA512
d6ab35314f9388cafc340edc4476f374faddf6b0905d736356be32fc3e77cb2baa09fedc13af5a43c10fb4631cc77e766b530e58fa47f98329e9e2371cdd7e8d
-
SSDEEP
12288:dQA0FfTcwpBuV2UxqDmuiLZeUaoFi2XZWfGe615HhAZV8DHKD/KeX:Tuf4wTuV2Ux3uIZeUBi2Te6HWaKrKe
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-