Static task
static1
Behavioral task
behavioral1
Sample
573873b7b2fbb390ff21bb4e986f69fa25a1f3eea2c5fe446d46c186ab92257d.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
573873b7b2fbb390ff21bb4e986f69fa25a1f3eea2c5fe446d46c186ab92257d.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
573873b7b2fbb390ff21bb4e986f69fa25a1f3eea2c5fe446d46c186ab92257d
-
Size
91KB
-
MD5
457a4ba6896e15e132cc084cb6cd7a80
-
SHA1
e79fc10dcf685be830578d09cb8ea2894b1d280d
-
SHA256
573873b7b2fbb390ff21bb4e986f69fa25a1f3eea2c5fe446d46c186ab92257d
-
SHA512
115bff1f55a14064e0deae457cfb3bf989f85091972dd30a207fde9f76a7bea19f5c689c2f5d5feccc1ee52d2e3a72dde159b2eb38bdac845d07ac0726d00104
Score
10/10
Malware Config
Signatures
-
Detected Netwalker Ransomware 1 IoCs
Detected unpacked Netwalker executable.
Processes:
resource yara_rule sample netwalker_ransomware -
Netwalker family
Files
-
573873b7b2fbb390ff21bb4e986f69fa25a1f3eea2c5fe446d46c186ab92257d.exe windows x86