General
-
Target
6f768b5db1b4c7ec2df1a8d012814e8903b0a1f0b1d3b7bdfff447a2cd24a281
-
Size
231KB
-
Sample
240719-137z5asflr
-
MD5
c619d1b49a183011ea3dc99347aaa77f
-
SHA1
271e7714874f2577fcda702c19b42e3471094a1e
-
SHA256
6f768b5db1b4c7ec2df1a8d012814e8903b0a1f0b1d3b7bdfff447a2cd24a281
-
SHA512
b717f2b06314826a15783786af2da26eb3d9e8598854535a0567d66b9227b3a0db7234e7eec58add7d078de6f5f3d91169a2612ea0a6e23deebe52904475ba09
-
SSDEEP
6144:BjVD0s8mf31trSqSgdRF7Kt5CIWR0XYI6r4J7V0zqO5x69:BRDhhteXgs5i4Jh0zbj69
Behavioral task
behavioral1
Sample
1bc0575b3fc6486cb2510dac1ac6ae4889b94a955d3eade53d3ba3a92d133281.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
1bc0575b3fc6486cb2510dac1ac6ae4889b94a955d3eade53d3ba3a92d133281.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\HOW_TO_RECOVER_DATA.html
Extracted
\Device\HarddiskVolume1\HOW_TO_RECOVER_DATA.html
Targets
-
-
Target
1bc0575b3fc6486cb2510dac1ac6ae4889b94a955d3eade53d3ba3a92d133281.exe
-
Size
235KB
-
MD5
f6f120d1262b88f79debb5d848ac7db9
-
SHA1
1339282f9b2d2a41326daf3cf284ec2ae8f0f93c
-
SHA256
1bc0575b3fc6486cb2510dac1ac6ae4889b94a955d3eade53d3ba3a92d133281
-
SHA512
1067c1a73cf891d651fa007f4ccc4452f32801fe3859933ef1bcc00985e35ce016fa6c601c0e3c10df2080fc9b8a776b2f18d40bd64dfb98177ab638c4b545bd
-
SSDEEP
6144:c5vMUmRTTgwnfeP+Jx1cLNAIyBcc9WrEWUC4wQh/6BeX:/U8Tgufnx1cLNncgQWUUQh/+e
-
MedusaLocker payload
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (330) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
2File Deletion
2Modify Registry
2