Static task
static1
Behavioral task
behavioral1
Sample
d5c106719e9c8878795899bede78505796659b1b347fe9374d8b2061fcc6a84c.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
d5c106719e9c8878795899bede78505796659b1b347fe9374d8b2061fcc6a84c.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
d5c106719e9c8878795899bede78505796659b1b347fe9374d8b2061fcc6a84c
-
Size
76KB
-
MD5
604e4eeb6966e6285d9cef769feca7ca
-
SHA1
0c21972f5299b944d808e7572249a97ad6312f0e
-
SHA256
d5c106719e9c8878795899bede78505796659b1b347fe9374d8b2061fcc6a84c
-
SHA512
5d725b5f3384cb2adb8a673484cf4651ccf095a13e003a9fad6a3e913b9b49e23b5019c0417ca8c34d8824da970cfea1aee04a3e2a9b14d23e7a2cef38a2adf4
Score
10/10
Malware Config
Signatures
-
Detected Netwalker Ransomware 1 IoCs
Detected unpacked Netwalker executable.
Processes:
resource yara_rule sample netwalker_ransomware -
Netwalker family
Files
-
d5c106719e9c8878795899bede78505796659b1b347fe9374d8b2061fcc6a84c.exe windows x86