Resubmissions
17-06-2021 13:31
210617-t6kkx9hs4j 10Static task
static1
Behavioral task
behavioral1
Sample
863e4557e550dd89e5ca0e43c57a3fc1889145c76ec9787e97f76e959fc8e1e1.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
863e4557e550dd89e5ca0e43c57a3fc1889145c76ec9787e97f76e959fc8e1e1.exe
Resource
win10v20210408
General
-
Target
863e4557e550dd89e5ca0e43c57a3fc1889145c76ec9787e97f76e959fc8e1e1
-
Size
128KB
-
MD5
d687eb9fea18e6836bd572b2d180b144
-
SHA1
0e7f076d59ab24ab04200415cb35037c619d0bae
-
SHA256
863e4557e550dd89e5ca0e43c57a3fc1889145c76ec9787e97f76e959fc8e1e1
-
SHA512
16aed099d7d1131facb76591176566a9de9a140948f467b7a43d7518215ce24490956b0996d0f7638cf0d313947f12d91d145ebe4d584779e119707d59463684
Malware Config
Signatures
-
TargetCompany Payload 1 IoCs
Processes:
resource yara_rule sample family_targetcompany -
Targetcompany family
-
Generic Ransomware Note 1 IoCs
Ransomware often writes a note containing information on how to pay the ransom.
Processes:
resource yara_rule sample generic_ransomware_note
Files
-
863e4557e550dd89e5ca0e43c57a3fc1889145c76ec9787e97f76e959fc8e1e1.exe windows x86