Behavioral task
behavioral1
Sample
12ADE3A9D6C79998D609CF5838A13676.exe
Resource
win7-20230220-en
windows7-x64
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
12ADE3A9D6C79998D609CF5838A13676.exe
Resource
win10v2004-20230220-en
windows10-2004-x64
0 signatures
150 seconds
General
-
Target
12ADE3A9D6C79998D609CF5838A13676.exe
-
Size
654KB
-
MD5
12ade3a9d6c79998d609cf5838a13676
-
SHA1
5f105c1f45ea4bdf6ca6654bd8bd1b25e38264f8
-
SHA256
e89cea4d336dd9896fe0e7b72636ec0d9caa861cff329d7ac3d4f3149a7e237f
-
SHA512
56213bf07c6c837c836c097a849bc87f50507fc5067debc08ae613df3b77be68e23864265a674d23fe8e5a2fb2b5a538322ead894fec7885da262667ea27315b
-
SSDEEP
12288:JPHoASnPvRFnfvfa+usAQxMaIBWMnoCniHZkMCWueaYhX0knOde/uwKmQJXuVGkM:JPHoASnPvRFnfK+hAQxnIBWMCkTIa6X5
Score
10/10
Malware Config
Signatures
-
MedusaLocker payload 1 IoCs
Processes:
resource yara_rule sample family_medusalocker -
Medusalocker family
Files
-
12ADE3A9D6C79998D609CF5838A13676.exe