Static task
static1
Behavioral task
behavioral1
Sample
ee531cd7011cb5c2625d40892b70cf7e3860dbb92648391068e1f340e5d6c47f.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
ee531cd7011cb5c2625d40892b70cf7e3860dbb92648391068e1f340e5d6c47f.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
ee531cd7011cb5c2625d40892b70cf7e3860dbb92648391068e1f340e5d6c47f
-
Size
69KB
-
MD5
a9e395e478d042c77b1090242bb11372
-
SHA1
cf53d001e7ec8b7ac48b78d1589f75ff388e8479
-
SHA256
ee531cd7011cb5c2625d40892b70cf7e3860dbb92648391068e1f340e5d6c47f
-
SHA512
29e1e16162a2baa47a065eeb1d2bd9b732e63e8c742b50c22278b05aad35987ea1301079c9cdc8716dd61ea313f098deb860e278e719f34e5a16056729749ba1
Score
10/10
Malware Config
Signatures
-
Detected Netwalker Ransomware 1 IoCs
Detected unpacked Netwalker executable.
Processes:
resource yara_rule sample netwalker_ransomware -
Netwalker family
Files
-
ee531cd7011cb5c2625d40892b70cf7e3860dbb92648391068e1f340e5d6c47f.exe windows x86