General
-
Target
medusa.zip
-
Size
231KB
-
Sample
231011-sav6vsee4y
-
MD5
11bd7fdd74a7d9888136f90a8f90e53e
-
SHA1
cf08d442ee5aeee4436419403fc847303c1bc287
-
SHA256
57d084a7879948df5fbab5fb9d6fabe552dcad4ff8b56dff15a4d5f8707ac9a8
-
SHA512
57687d9a8d7ef8f478922e99a08b61bb6a27cf5bd210717e201f8821c09fc4cd7770dbcddcbb18a6a97377c88396544ff0651434ed74aa699e36c1f8c5ba4b74
-
SSDEEP
6144:EmzN5qlWmNh+zscQ5Ti0cmST6Db8OACdhOSNd+6:EZElYcQxgDLAkB6
Behavioral task
behavioral1
Sample
1bc0575b3fc6486cb2510dac1ac6ae4889b94a955d3eade53d3ba3a92d133281.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1bc0575b3fc6486cb2510dac1ac6ae4889b94a955d3eade53d3ba3a92d133281.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\HOW_TO_RECOVER_DATA.html
Extracted
C:\odt\HOW_TO_RECOVER_DATA.html
Targets
-
-
Target
1bc0575b3fc6486cb2510dac1ac6ae4889b94a955d3eade53d3ba3a92d133281.exe
-
Size
235KB
-
MD5
f6f120d1262b88f79debb5d848ac7db9
-
SHA1
1339282f9b2d2a41326daf3cf284ec2ae8f0f93c
-
SHA256
1bc0575b3fc6486cb2510dac1ac6ae4889b94a955d3eade53d3ba3a92d133281
-
SHA512
1067c1a73cf891d651fa007f4ccc4452f32801fe3859933ef1bcc00985e35ce016fa6c601c0e3c10df2080fc9b8a776b2f18d40bd64dfb98177ab638c4b545bd
-
SSDEEP
6144:c5vMUmRTTgwnfeP+Jx1cLNAIyBcc9WrEWUC4wQh/6BeX:/U8Tgufnx1cLNncgQWUUQh/+e
-
MedusaLocker payload
-
Renames multiple (295) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
2File Deletion
2Modify Registry
2