General
-
Target
9708006633.zip
-
Size
231KB
-
Sample
230323-vhwtgaha47
-
MD5
1707bf8537daa1d7cf0f437ef1ad5565
-
SHA1
62735ca85e497baefc4da7dd72adb6c01f88e27b
-
SHA256
1af845c322838b612007fc65a9642777d5123a0d74fd01adea7991485e022ded
-
SHA512
b59c14d2311f0ae86a86e471686bf610c5945bd45a175d525103b19612437e5709d3d4f2afe2de4f3ec175dc0e94918b0928644b5fc9e421f829e64698daa6b0
-
SSDEEP
6144:IU/sfrwGRTGzUN/H2vre7x54bcGKjbrevFM+eEaCG:Itrtuy7xib7MbKG+eEaD
Behavioral task
behavioral1
Sample
9708006633.zip
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
9708006633.zip
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
1bc0575b3fc6486cb2510dac1ac6ae4889b94a955d3eade53d3ba3a92d133281.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
1bc0575b3fc6486cb2510dac1ac6ae4889b94a955d3eade53d3ba3a92d133281.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
out.exe
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
out.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\HOW_TO_RECOVER_DATA.html
Extracted
\Device\HarddiskVolume1\Boot\HOW_TO_RECOVER_DATA.html
Targets
-
-
Target
9708006633.zip
-
Size
231KB
-
MD5
1707bf8537daa1d7cf0f437ef1ad5565
-
SHA1
62735ca85e497baefc4da7dd72adb6c01f88e27b
-
SHA256
1af845c322838b612007fc65a9642777d5123a0d74fd01adea7991485e022ded
-
SHA512
b59c14d2311f0ae86a86e471686bf610c5945bd45a175d525103b19612437e5709d3d4f2afe2de4f3ec175dc0e94918b0928644b5fc9e421f829e64698daa6b0
-
SSDEEP
6144:IU/sfrwGRTGzUN/H2vre7x54bcGKjbrevFM+eEaCG:Itrtuy7xib7MbKG+eEaD
Score1/10 -
-
-
Target
1bc0575b3fc6486cb2510dac1ac6ae4889b94a955d3eade53d3ba3a92d133281
-
Size
235KB
-
MD5
f6f120d1262b88f79debb5d848ac7db9
-
SHA1
1339282f9b2d2a41326daf3cf284ec2ae8f0f93c
-
SHA256
1bc0575b3fc6486cb2510dac1ac6ae4889b94a955d3eade53d3ba3a92d133281
-
SHA512
1067c1a73cf891d651fa007f4ccc4452f32801fe3859933ef1bcc00985e35ce016fa6c601c0e3c10df2080fc9b8a776b2f18d40bd64dfb98177ab638c4b545bd
-
SSDEEP
6144:c5vMUmRTTgwnfeP+Jx1cLNAIyBcc9WrEWUC4wQh/6BeX:/U8Tgufnx1cLNncgQWUUQh/+e
-
MedusaLocker payload
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
-
-
Target
out.upx
-
Size
669KB
-
MD5
3f002221f0a15187df187cb222d0cb6b
-
SHA1
0fa815635807c05c2f0e85f0f09362a8e90d1324
-
SHA256
ae00ad8ba6abc6ddac815187f1285cba597d0af8fa4d5ffe429bffb3b6140b5b
-
SHA512
08bab72bb09b96685f949845858cbaa4f709f7069971ad1f36849cd3f8fde699c1a2d1c0ae5ee397d57057c81c98f6be41c64caaa5e9435d92e10fa1623660d5
-
SSDEEP
12288:gQA0FfTcwpBuV2UxqDmuiLZeUaoFi2XZWfGe615HhAZV8DdI:Muf4wTuV2Ux3uIZeUBi2Te6HW4I
Score1/10 -