Static task
static1
Behavioral task
behavioral1
Sample
4df67a9e8abab33856a586cea38b0d365fbbe0d91ee848f270c65f0125d2d677.bin.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
4df67a9e8abab33856a586cea38b0d365fbbe0d91ee848f270c65f0125d2d677.bin.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
4df67a9e8abab33856a586cea38b0d365fbbe0d91ee848f270c65f0125d2d677.bin
-
Size
69KB
-
MD5
5ce75526a25c81d0178d8092251013f0
-
SHA1
1e1b1c4ae648786fe429c9ddd2182e0d58bcf423
-
SHA256
4df67a9e8abab33856a586cea38b0d365fbbe0d91ee848f270c65f0125d2d677
-
SHA512
740b9dba2119736e3b9e4c47654c264770d6bca4fe5b46ce32a33acfc09278a559cba9c72478d304e85654f381925e1204422b75c1e13fd26f4ab2511316e205
Score
10/10
Malware Config
Signatures
-
Detected Netwalker Ransomware 1 IoCs
Detected unpacked Netwalker executable.
Processes:
resource yara_rule sample netwalker_ransomware -
Netwalker family
Files
-
4df67a9e8abab33856a586cea38b0d365fbbe0d91ee848f270c65f0125d2d677.bin.exe windows x86