Static task
static1
Behavioral task
behavioral1
Sample
MHWv20200109-20201001FLiNG+67.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
MHWv20200109-20201001FLiNG+67.exe
Resource
win10v200722
windows10_x64
0 signatures
0 seconds
General
-
Target
MHWv20200109-20201001FLiNG+67.exe
-
Size
1.6MB
-
MD5
d8d04a49a7ebe94d52daa21380c7f981
-
SHA1
c61619f51bb3ded298be6ff4f37d657c7f4dee88
-
SHA256
48000c42895041ab94da59597b322a9afeacac40cbd8d7654115df6eaed44708
-
SHA512
6aa11b73cbfc871ea23ecc136e2585de98ff2989f6ac20a9db8855df0657024990a4f87cf1dc2413fd49e66c8ce57246f7405911e1b24d22e49727a4aae035e0
Score
10/10
Malware Config
Signatures
-
R77 family
-
r77 rootkit payload 1 IoCs
Detects the payload of the r77 rootkit.
resource yara_rule sample r77_payload
Files
-
MHWv20200109-20201001FLiNG+67.exe.exe windows x64