General
-
Target
9629508334.zip
-
Size
170KB
-
Sample
230320-z5w5zafd79
-
MD5
e6109b8b50d65f97a94697a02d48465c
-
SHA1
f2870941a37add1662a118d3a99fab0d7ff126f8
-
SHA256
4af89ff4b3a8783226e1d38bf7e8eea6cd135e9708b214273e6d41d024f1970f
-
SHA512
4f912289a561003c10508ebeaa324a420d7e1c27f92304ee3316cdb9f9cf69c95c92bde252e3ae817daca38d1593bbc97bed64606be35f7d0235492340fd8cd9
-
SSDEEP
3072:VFf2+0KmcneijvG6fnCtywpocf4BU6fFXS/ffKF5Ff+rBI9/OYFYhrnuPQgffKZ3:r2+0cndzGIny4UuSnfGFf+ruFLYgPjS3
Static task
static1
Behavioral task
behavioral1
Sample
db283565dde766bc4e436d0a61855497a6491b0ef09d024ba3b52ca8676ee2a0.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
db283565dde766bc4e436d0a61855497a6491b0ef09d024ba3b52ca8676ee2a0.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
C:\Users\Public\Desktop\How_to_back_files.html
medusalocker
Targets
-
-
Target
db283565dde766bc4e436d0a61855497a6491b0ef09d024ba3b52ca8676ee2a0
-
Size
332KB
-
MD5
315ba41e7afd432a90b91ecca8785606
-
SHA1
700b771bb556457b39e3b021aea3386297c17328
-
SHA256
db283565dde766bc4e436d0a61855497a6491b0ef09d024ba3b52ca8676ee2a0
-
SHA512
d22a4936631118a675e988caa5a4f6b8fd99a113abb02c73da9dd5a67f6a20285a68ab90acce961c312492c03a9743bfc2d36959cf10ad18f6d562c893ae8d2f
-
SSDEEP
6144:SSu95CM96x7SQmTY3q1af/eP0J8j9HvJpktPV1Hni+oA7SCtkW:M9IM9wmTY3Uaf/eMGFWhbtkW
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies boot configuration data using bcdedit
-
Modifies Installed Components in the registry
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-