General
-
Target
08c7dfde13ade4b13350ae290616d7c2f4a87cbeac9a3886e90a175ee40fb641.bin
-
Size
65KB
-
Sample
200727-rx7ymk92j2
-
MD5
5ff20e2b723edb2d0fb27df4fc2c4468
-
SHA1
e53d4b589f5c5ef6afd23299550f70c69bc2fe1c
-
SHA256
08c7dfde13ade4b13350ae290616d7c2f4a87cbeac9a3886e90a175ee40fb641
-
SHA512
cbcb5bda77351902d149608b4df5637347bcd06f26fba83147c4de42b52ae675e3a0761691c19cb0cadc5b03f32cd0810951ba23cf21ebe266f1ec724ffee996
Static task
static1
Behavioral task
behavioral1
Sample
08c7dfde13ade4b13350ae290616d7c2f4a87cbeac9a3886e90a175ee40fb641.bin.exe
Resource
win7
Behavioral task
behavioral2
Sample
08c7dfde13ade4b13350ae290616d7c2f4a87cbeac9a3886e90a175ee40fb641.bin.exe
Resource
win10v200722
Malware Config
Extracted
C:\NEFILIM-DECRYPT.txt
Targets
-
-
Target
08c7dfde13ade4b13350ae290616d7c2f4a87cbeac9a3886e90a175ee40fb641.bin
-
Size
65KB
-
MD5
5ff20e2b723edb2d0fb27df4fc2c4468
-
SHA1
e53d4b589f5c5ef6afd23299550f70c69bc2fe1c
-
SHA256
08c7dfde13ade4b13350ae290616d7c2f4a87cbeac9a3886e90a175ee40fb641
-
SHA512
cbcb5bda77351902d149608b4df5637347bcd06f26fba83147c4de42b52ae675e3a0761691c19cb0cadc5b03f32cd0810951ba23cf21ebe266f1ec724ffee996
Score10/10-
Nefilim
Ransomware first seen in early 2020 which shares code with the Nemty family. Rewritten in Golang in July 2020.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Deletes itself
-