Static task
static1
Behavioral task
behavioral1
Sample
8f06645838d3d75e44d4527e2928c71af0a7214254867379359eb3e46109cbde.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
8f06645838d3d75e44d4527e2928c71af0a7214254867379359eb3e46109cbde.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
8f06645838d3d75e44d4527e2928c71af0a7214254867379359eb3e46109cbde
-
Size
69KB
-
MD5
2b0384be06d20d3f4dd95cb5dda08683
-
SHA1
0a8516e8309816c029958b8d8485bc3cd4daa01d
-
SHA256
8f06645838d3d75e44d4527e2928c71af0a7214254867379359eb3e46109cbde
-
SHA512
07528a739430be0c8b3074d0c7b4f04e7f9d99acd30b87c9238b66e8ad2af811f4ac7eb0702f2527970d8ae36780c87dc39d6acde397b9c605a54f5b9fe1f1d2
Score
10/10
Malware Config
Signatures
-
Detected Netwalker Ransomware 1 IoCs
Detected unpacked Netwalker executable.
Processes:
resource yara_rule sample netwalker_ransomware -
Netwalker family
Files
-
8f06645838d3d75e44d4527e2928c71af0a7214254867379359eb3e46109cbde.exe windows x86