General
-
Target
4ef811b784b985769645e03bc0b9cd24
-
Size
669KB
-
Sample
240109-xrn64aaae6
-
MD5
4ef811b784b985769645e03bc0b9cd24
-
SHA1
2e04a37b215dd2a95694b1c18dbe1dd35be5aa9f
-
SHA256
4f9a833e79092006c06203a66b41fc9250bcebcee148fea404db75d52035131c
-
SHA512
34e9a5a015b04ae904b50a0b2e466788db16d7eb43769fec156cab830932032174b3a43a206016332f99eb16571225dc1a0a0042ce2bca67de1821bbc08c039c
-
SSDEEP
12288:dQA0FfTcwpBuV2UxqDmuiLZeUaoFi2XZWfGe615HhAZV8DBKD/KeX:Tuf4wTuV2Ux3uIZeUBi2Te6HWUKrKe
Behavioral task
behavioral1
Sample
4ef811b784b985769645e03bc0b9cd24.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4ef811b784b985769645e03bc0b9cd24.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
\Device\HarddiskVolume1\Boot\HOW_TO_RECOVER_DATA.html
Targets
-
-
Target
4ef811b784b985769645e03bc0b9cd24
-
Size
669KB
-
MD5
4ef811b784b985769645e03bc0b9cd24
-
SHA1
2e04a37b215dd2a95694b1c18dbe1dd35be5aa9f
-
SHA256
4f9a833e79092006c06203a66b41fc9250bcebcee148fea404db75d52035131c
-
SHA512
34e9a5a015b04ae904b50a0b2e466788db16d7eb43769fec156cab830932032174b3a43a206016332f99eb16571225dc1a0a0042ce2bca67de1821bbc08c039c
-
SSDEEP
12288:dQA0FfTcwpBuV2UxqDmuiLZeUaoFi2XZWfGe615HhAZV8DBKD/KeX:Tuf4wTuV2Ux3uIZeUBi2Te6HWUKrKe
-
MedusaLocker payload
-
Renames multiple (283) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
2File Deletion
2Modify Registry
2