Resubmissions
23-03-2023 17:09
230323-vpjgqaba6z 10Behavioral task
behavioral1
Sample
9682372408.zip
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
9682372408.zip
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
1bc0575b3fc6486cb2510dac1ac6ae4889b94a955d3eade53d3ba3a92d133281.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
1bc0575b3fc6486cb2510dac1ac6ae4889b94a955d3eade53d3ba3a92d133281.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
out.exe
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
out.exe
Resource
win10v2004-20230220-en
General
-
Target
9682372408.zip
-
Size
231KB
-
MD5
1707bf8537daa1d7cf0f437ef1ad5565
-
SHA1
62735ca85e497baefc4da7dd72adb6c01f88e27b
-
SHA256
1af845c322838b612007fc65a9642777d5123a0d74fd01adea7991485e022ded
-
SHA512
b59c14d2311f0ae86a86e471686bf610c5945bd45a175d525103b19612437e5709d3d4f2afe2de4f3ec175dc0e94918b0928644b5fc9e421f829e64698daa6b0
-
SSDEEP
6144:IU/sfrwGRTGzUN/H2vre7x54bcGKjbrevFM+eEaCG:Itrtuy7xib7MbKG+eEaD
Malware Config
Signatures
-
MedusaLocker payload 1 IoCs
Processes:
resource yara_rule static1/unpack002/out.upx family_medusalocker -
Medusalocker family
-
Processes:
resource yara_rule static1/unpack001/1bc0575b3fc6486cb2510dac1ac6ae4889b94a955d3eade53d3ba3a92d133281 upx
Files
-
9682372408.zip.zip
Password: infected
-
1bc0575b3fc6486cb2510dac1ac6ae4889b94a955d3eade53d3ba3a92d133281.exe windows x86
Password: infected
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 468KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 233KB - Virtual size: 236KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 459KB - Virtual size: 458KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 171KB - Virtual size: 171KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ