Static task
static1
Behavioral task
behavioral1
Sample
bde6a59a4611aba5862ce66aef2fb12d841ad0ba0ad0a590b26eaddb7ad52a9e.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
bde6a59a4611aba5862ce66aef2fb12d841ad0ba0ad0a590b26eaddb7ad52a9e.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
bde6a59a4611aba5862ce66aef2fb12d841ad0ba0ad0a590b26eaddb7ad52a9e
-
Size
92KB
-
MD5
51b3c42e1c5c8d736d934af459204471
-
SHA1
db4084bfee8902fd025c31f0cfea7b2ee52e5e70
-
SHA256
bde6a59a4611aba5862ce66aef2fb12d841ad0ba0ad0a590b26eaddb7ad52a9e
-
SHA512
75cb47ab16f48a35bf8825c61c259e3392bde93dd993556fa9167dd096d8f635374cfafe886aec84056aceaf0b8fabb5122d09f871b9f093282bb0902a5c5178
Score
10/10
Malware Config
Signatures
-
Detected Netwalker Ransomware 1 IoCs
Detected unpacked Netwalker executable.
Processes:
resource yara_rule sample netwalker_ransomware -
Netwalker family
Files
-
bde6a59a4611aba5862ce66aef2fb12d841ad0ba0ad0a590b26eaddb7ad52a9e.exe windows x86