Static task
static1
Behavioral task
behavioral1
Sample
75ef9e3e44ac11bb06f499b9f4f43a4cc331887529b81d0e62aef87178ca5e65.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
75ef9e3e44ac11bb06f499b9f4f43a4cc331887529b81d0e62aef87178ca5e65.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
75ef9e3e44ac11bb06f499b9f4f43a4cc331887529b81d0e62aef87178ca5e65
-
Size
94KB
-
MD5
da4ae503d72a89e54701da53c7ccfdb7
-
SHA1
7aac6048c4c98dd4130295f0b9ccc2015c7c9a49
-
SHA256
75ef9e3e44ac11bb06f499b9f4f43a4cc331887529b81d0e62aef87178ca5e65
-
SHA512
ebfc7f613e95f845d09d00d4ee48230f386a458569c76a0596c1c00a7d5b710045a304cd34ff91487d51a37fbe20b5d9db92479823cbfdec401b65ed4cb13e02
Score
10/10
Malware Config
Signatures
-
Detected Netwalker Ransomware 1 IoCs
Detected unpacked Netwalker executable.
Processes:
resource yara_rule sample netwalker_ransomware -
Netwalker family
Files
-
75ef9e3e44ac11bb06f499b9f4f43a4cc331887529b81d0e62aef87178ca5e65.exe windows x86