General
-
Target
medusa.zip
-
Size
231KB
-
Sample
230926-ln94lshe44
-
MD5
11bd7fdd74a7d9888136f90a8f90e53e
-
SHA1
cf08d442ee5aeee4436419403fc847303c1bc287
-
SHA256
57d084a7879948df5fbab5fb9d6fabe552dcad4ff8b56dff15a4d5f8707ac9a8
-
SHA512
57687d9a8d7ef8f478922e99a08b61bb6a27cf5bd210717e201f8821c09fc4cd7770dbcddcbb18a6a97377c88396544ff0651434ed74aa699e36c1f8c5ba4b74
-
SSDEEP
6144:EmzN5qlWmNh+zscQ5Ti0cmST6Db8OACdhOSNd+6:EZElYcQxgDLAkB6
Behavioral task
behavioral1
Sample
1bc0575b3fc6486cb2510dac1ac6ae4889b94a955d3eade53d3ba3a92d133281.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral2
Sample
out.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
\Device\HarddiskVolume1\Boot\HOW_TO_RECOVER_DATA.html
Extracted
C:\Users\Admin\Desktop\HOW_TO_RECOVER_DATA.html
medusalocker
Targets
-
-
Target
1bc0575b3fc6486cb2510dac1ac6ae4889b94a955d3eade53d3ba3a92d133281.exe
-
Size
235KB
-
MD5
f6f120d1262b88f79debb5d848ac7db9
-
SHA1
1339282f9b2d2a41326daf3cf284ec2ae8f0f93c
-
SHA256
1bc0575b3fc6486cb2510dac1ac6ae4889b94a955d3eade53d3ba3a92d133281
-
SHA512
1067c1a73cf891d651fa007f4ccc4452f32801fe3859933ef1bcc00985e35ce016fa6c601c0e3c10df2080fc9b8a776b2f18d40bd64dfb98177ab638c4b545bd
-
SSDEEP
6144:c5vMUmRTTgwnfeP+Jx1cLNAIyBcc9WrEWUC4wQh/6BeX:/U8Tgufnx1cLNncgQWUUQh/+e
-
MedusaLocker payload
-
Renames multiple (227) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
-
-
Target
out.upx
-
Size
669KB
-
MD5
3f002221f0a15187df187cb222d0cb6b
-
SHA1
0fa815635807c05c2f0e85f0f09362a8e90d1324
-
SHA256
ae00ad8ba6abc6ddac815187f1285cba597d0af8fa4d5ffe429bffb3b6140b5b
-
SHA512
08bab72bb09b96685f949845858cbaa4f709f7069971ad1f36849cd3f8fde699c1a2d1c0ae5ee397d57057c81c98f6be41c64caaa5e9435d92e10fa1623660d5
-
SSDEEP
12288:gQA0FfTcwpBuV2UxqDmuiLZeUaoFi2XZWfGe615HhAZV8DdI:Muf4wTuV2Ux3uIZeUBi2Te6HW4I
Score1/10 -
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2