General

  • Target

    220201-tb2kpshagn

  • Size

    2.6MB

  • MD5

    aa3684dd93b13628b626723bfe313dbc

  • SHA1

    d2a08733f52ba0187dd43a45b7ea6953f69522bd

  • SHA256

    02f250a3df59dec575f26679ebd25de7c1d5b4d9d08016685f87a3628a393f92

  • SHA512

    22ffb71722f5afd6925d37628585dc182e3f2cfd6f472a522e8a418dcf7adf76c16aed6313c9a477e2cfa3b646bf450f2cffee8d37a51a63c926c5ef18450ac0

  • SSDEEP

    24576:3z6+t2x6zy+jerMRSFJZLIMMXXKIdwjP3rWFhtCMzGkx8W9GTjneJN9U:3pMx6jKF7eXKYwj/e0kxTGT6JN2

Score
10/10

Malware Config

Signatures

  • Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) 1 IoCs
  • Detects command variations typically used by ransomware 1 IoCs
  • MedusaLocker payload 1 IoCs
  • Medusalocker family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 220201-tb2kpshagn
    .exe windows:6 windows x86 arch:x86

    26e486a4fc4681c86953736558353af3


    Headers

    Imports

    Sections