Static task
static1
Behavioral task
behavioral1
Sample
209779474d4b8e7246245092e7d094ce5730c5c1d36bc03d9b8120f211dc3ebe.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
209779474d4b8e7246245092e7d094ce5730c5c1d36bc03d9b8120f211dc3ebe.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
209779474d4b8e7246245092e7d094ce5730c5c1d36bc03d9b8120f211dc3ebe
-
Size
94KB
-
MD5
69f1172b3f31746992b86467578d5ab2
-
SHA1
f24491dc99ad02f0d1c502b312df0b51670db738
-
SHA256
209779474d4b8e7246245092e7d094ce5730c5c1d36bc03d9b8120f211dc3ebe
-
SHA512
a893f5d07f3db175eec9441197b499ce856a089386a2d95f0dd4cd37734e060f9216125425f229841e8a8c825dddc2c26e82ccd41d802d7f55dbf0ea321b7c46
Score
10/10
Malware Config
Signatures
-
Detected Netwalker Ransomware 1 IoCs
Detected unpacked Netwalker executable.
Processes:
resource yara_rule sample netwalker_ransomware -
Netwalker family
Files
-
209779474d4b8e7246245092e7d094ce5730c5c1d36bc03d9b8120f211dc3ebe.exe windows x86