Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
31-05-2024 13:32
Static task
static1
Behavioral task
behavioral1
Sample
6f5fc7c80132e86b697df53ba3d487c6b6342b9eb43e8bc0b02e7957279c15b7.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6f5fc7c80132e86b697df53ba3d487c6b6342b9eb43e8bc0b02e7957279c15b7.exe
Resource
win10v2004-20240508-en
General
-
Target
6f5fc7c80132e86b697df53ba3d487c6b6342b9eb43e8bc0b02e7957279c15b7.exe
-
Size
543KB
-
MD5
6b9b54e880f3d75e4c2c128d2f34adb6
-
SHA1
85385606bdd97a9939a145d100569449a034576e
-
SHA256
6f5fc7c80132e86b697df53ba3d487c6b6342b9eb43e8bc0b02e7957279c15b7
-
SHA512
03a1897681d28594a13cdb3c347424ef6e90ab29f11cf8e040ad827fc62dbcccbc61eec6bab203b3a99edb5b2ca1718e8ec5112fabdd979b1ba86754a266cabc
-
SSDEEP
12288:EirHRTnZ6PTa83j3abCiS6PCMapYW9VxF/MGOP0EpW039S4091ifr:RrZ6PTpjab0cCMapY4x5MGfMW0I448
Malware Config
Signatures
-
MedusaLocker
Ransomware with several variants first seen in September 2019.
-
MedusaLocker payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2424-6-0x0000000000400000-0x0000000000478000-memory.dmp family_medusalocker behavioral1/memory/2424-8-0x0000000000400000-0x0000000000478000-memory.dmp family_medusalocker behavioral1/memory/2424-3-0x0000000000400000-0x0000000000478000-memory.dmp family_medusalocker behavioral1/memory/2424-4-0x0000000000400000-0x0000000000478000-memory.dmp family_medusalocker behavioral1/memory/2424-9-0x0000000000400000-0x0000000000478000-memory.dmp family_medusalocker