Static task
static1
Behavioral task
behavioral1
Sample
63ad8faf3c2b306ccd8aa7874e24e7d48e0f6bbeeb37adab26c2efa1410022c4.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
63ad8faf3c2b306ccd8aa7874e24e7d48e0f6bbeeb37adab26c2efa1410022c4.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
63ad8faf3c2b306ccd8aa7874e24e7d48e0f6bbeeb37adab26c2efa1410022c4
-
Size
80KB
-
MD5
bdc345b7bcecf485d2ee9f0011fd2fb3
-
SHA1
b1610f94dc8235d939b4817c36e09a8ebc3a29dd
-
SHA256
63ad8faf3c2b306ccd8aa7874e24e7d48e0f6bbeeb37adab26c2efa1410022c4
-
SHA512
1d56a85688d6499512421b38ecca8167e31c0ec2bbfc812e6c742820690f7e608c45b6e7159c59b583f608a724f855a6481facda0846ccd7ee4acac446a83335
Score
10/10
Malware Config
Signatures
-
Detected Netwalker Ransomware 1 IoCs
Detected unpacked Netwalker executable.
Processes:
resource yara_rule sample netwalker_ransomware -
Netwalker family
Files
-
63ad8faf3c2b306ccd8aa7874e24e7d48e0f6bbeeb37adab26c2efa1410022c4.exe windows x86