General
-
Target
f6f120d1262b88f79debb5d848ac7db9.bin
-
Size
231KB
-
Sample
230408-c5ppkade9z
-
MD5
73454f9baa392bc5242e021b5893331c
-
SHA1
53e4522fd7bd17cedf8c7d1dc8f93e7e00b0b0d4
-
SHA256
f32b419e482fbd17e06913076385025e4def40fce4f7ec56050068e39af5b464
-
SHA512
63f4904bbd441c2c77090f079a6ddcfcde60a8bffef8de45bf15ddc331f284c8a2da23e000a0b121449509da54d2a5039900f700aef3dc31c4f27477c4e43b5e
-
SSDEEP
6144:fvGMQk/NeUW8uYTEwKdda8VDW5aFvAzJWMJTgEUs:xQk/4FjwErdEuS5qY1W8qs
Behavioral task
behavioral1
Sample
1bc0575b3fc6486cb2510dac1ac6ae4889b94a955d3eade53d3ba3a92d133281.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1bc0575b3fc6486cb2510dac1ac6ae4889b94a955d3eade53d3ba3a92d133281.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\HOW_TO_RECOVER_DATA.html
Extracted
\Device\HarddiskVolume1\Boot\HOW_TO_RECOVER_DATA.html
Targets
-
-
Target
1bc0575b3fc6486cb2510dac1ac6ae4889b94a955d3eade53d3ba3a92d133281.exe
-
Size
235KB
-
MD5
f6f120d1262b88f79debb5d848ac7db9
-
SHA1
1339282f9b2d2a41326daf3cf284ec2ae8f0f93c
-
SHA256
1bc0575b3fc6486cb2510dac1ac6ae4889b94a955d3eade53d3ba3a92d133281
-
SHA512
1067c1a73cf891d651fa007f4ccc4452f32801fe3859933ef1bcc00985e35ce016fa6c601c0e3c10df2080fc9b8a776b2f18d40bd64dfb98177ab638c4b545bd
-
SSDEEP
6144:c5vMUmRTTgwnfeP+Jx1cLNAIyBcc9WrEWUC4wQh/6BeX:/U8Tgufnx1cLNncgQWUUQh/+e
-
MedusaLocker payload
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-