Static task
static1
Behavioral task
behavioral1
Sample
86c54f746b7af0ffaa40444e44b4dfd8e2d598bb31ad932cc2fb1ac1c83237ce.bin.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
86c54f746b7af0ffaa40444e44b4dfd8e2d598bb31ad932cc2fb1ac1c83237ce.bin.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
86c54f746b7af0ffaa40444e44b4dfd8e2d598bb31ad932cc2fb1ac1c83237ce.bin
-
Size
54KB
-
MD5
271f22e2f9fe88b2ca8b2470c998e740
-
SHA1
29eb2fbf2c0ca7692ed291b2a0e3b1d96ccc2fa4
-
SHA256
86c54f746b7af0ffaa40444e44b4dfd8e2d598bb31ad932cc2fb1ac1c83237ce
-
SHA512
f4728112ca9d88a2c447a47230edeeb5806de327c951ee2a0c85f1fa37bf9642e3ea29addae9755b814f00e9d669a6d39eaa8e1af4b302c002e181e897fb3e45
Score
10/10
Malware Config
Signatures
-
Detected Netwalker Ransomware 1 IoCs
Detected unpacked Netwalker executable.
Processes:
resource yara_rule sample netwalker_ransomware -
Netwalker family
Files
-
86c54f746b7af0ffaa40444e44b4dfd8e2d598bb31ad932cc2fb1ac1c83237ce.bin.exe windows x86