Static task
static1
Behavioral task
behavioral1
Sample
74fd9bbdd8a484640e4b0405a1da84734a0a9c2604ac1b0a39fa2e28b0c12614.bin.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
74fd9bbdd8a484640e4b0405a1da84734a0a9c2604ac1b0a39fa2e28b0c12614.bin.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
74fd9bbdd8a484640e4b0405a1da84734a0a9c2604ac1b0a39fa2e28b0c12614.bin
-
Size
69KB
-
MD5
5f55ac3dd18950583dadffc1970745c5
-
SHA1
6a13535190bdcd62af6b4930ea28664c13c6a6be
-
SHA256
74fd9bbdd8a484640e4b0405a1da84734a0a9c2604ac1b0a39fa2e28b0c12614
-
SHA512
0839dfa13d2fa8752b032ccdb57c15533785724226a156e6c3befb0209a5d5ea8282217f7737ce9b3d6566f3c47abba6586c922063f3ca1fefa267b228f6b062
Score
10/10
Malware Config
Signatures
-
Detected Netwalker Ransomware 1 IoCs
Detected unpacked Netwalker executable.
Processes:
resource yara_rule sample netwalker_ransomware -
Netwalker family
Files
-
74fd9bbdd8a484640e4b0405a1da84734a0a9c2604ac1b0a39fa2e28b0c12614.bin.exe windows x86