Static task
static1
Behavioral task
behavioral1
Sample
167bf2356e65b04407cd2d8299a9b315f213808b04c341f6aad5820fc46a3c49.bin.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
167bf2356e65b04407cd2d8299a9b315f213808b04c341f6aad5820fc46a3c49.bin.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
167bf2356e65b04407cd2d8299a9b315f213808b04c341f6aad5820fc46a3c49.bin
-
Size
69KB
-
MD5
9172586c2f870ab76eb0852d1f4dfaea
-
SHA1
69e858f578fb0e7fdfb1d26db52dd6a95f5802ff
-
SHA256
167bf2356e65b04407cd2d8299a9b315f213808b04c341f6aad5820fc46a3c49
-
SHA512
a44bfdb4a86bfd9446015f6eaf4103dcf455ce1b56d38b0307251f1bc5187a036e85de2b2b8cd1d959dd6df13675d8fa64c1a8c60b73845d32897a0c4f360ed4
Score
10/10
Malware Config
Signatures
-
Detected Netwalker Ransomware 1 IoCs
Detected unpacked Netwalker executable.
Processes:
resource yara_rule sample netwalker_ransomware -
Netwalker family
Files
-
167bf2356e65b04407cd2d8299a9b315f213808b04c341f6aad5820fc46a3c49.bin.exe windows x86