Sample
- SHA256
-
461f8a55ea2eecfcc26562326af4b56fbaf8e4957a4a6e0b75bec8ee90ace078 - Difficulty
- easy
- Platform
- Windows
- Tags
- medusa ransomware
- Likes
- 0
- Views
- 9
- Submitter
- struppigel
Analysis
Goal
Identify the algorithms which are involved in medusa's file encryption.
Description
This is medusa ransomware. It has a very typical file encryption procedure.
Recommended Tools
ghidra
Comments
Please login to view and post comments.