Static task
static1
Behavioral task
behavioral1
Sample
4abf2d4b604ad5c3dca0006e9762562ea104e76e7c0dcfa8fddafda8b11b2eaf.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
4abf2d4b604ad5c3dca0006e9762562ea104e76e7c0dcfa8fddafda8b11b2eaf.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
4abf2d4b604ad5c3dca0006e9762562ea104e76e7c0dcfa8fddafda8b11b2eaf
-
Size
69KB
-
MD5
729928e6fd6adafdd0a7fe876701bd7e
-
SHA1
0aa73a466c599b0b2c6e60f0aa0676b9bf6741c7
-
SHA256
4abf2d4b604ad5c3dca0006e9762562ea104e76e7c0dcfa8fddafda8b11b2eaf
-
SHA512
ebb5b53b5f4b6a3fcf7b7b19b4b7f657f0a03268223d6fd1209e2e4b9d837a8aa3a8ce79ab64a2a843c120cec366d4191f1e0452529d8360ed0ee06c0c75445e
Score
10/10
Malware Config
Signatures
-
Detected Netwalker Ransomware 1 IoCs
Detected unpacked Netwalker executable.
Processes:
resource yara_rule sample netwalker_ransomware -
Netwalker family
Files
-
4abf2d4b604ad5c3dca0006e9762562ea104e76e7c0dcfa8fddafda8b11b2eaf.exe windows x86