Static task
static1
Behavioral task
behavioral1
Sample
162ae350c47c2e14864d0c0f927bf424eb6b844017329c9b1e216f3e2d724d98.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
162ae350c47c2e14864d0c0f927bf424eb6b844017329c9b1e216f3e2d724d98.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
162ae350c47c2e14864d0c0f927bf424eb6b844017329c9b1e216f3e2d724d98
-
Size
69KB
-
MD5
18c32583a6fe320b4dc66a251be45e64
-
SHA1
c3d0c0568fa08b94172d88fc0c0795cf7da31b60
-
SHA256
162ae350c47c2e14864d0c0f927bf424eb6b844017329c9b1e216f3e2d724d98
-
SHA512
3faaed3f4aeda3f04a9325e20e9df5e907239c9329913d688009f008763b6960956df87d84c5cc809e2c9cbcbc9da12e6b0f6745c69e3ade3e0ad2ff0f747c1c
Score
10/10
Malware Config
Signatures
-
Detected Netwalker Ransomware 1 IoCs
Detected unpacked Netwalker executable.
Processes:
resource yara_rule sample netwalker_ransomware -
Netwalker family
Files
-
162ae350c47c2e14864d0c0f927bf424eb6b844017329c9b1e216f3e2d724d98.exe windows x86