Static task
static1
Behavioral task
behavioral1
Sample
5e03e3d93a456405952cdadee3018043789f118b871b93d113ce371c079f19dd.sample.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
5e03e3d93a456405952cdadee3018043789f118b871b93d113ce371c079f19dd.sample.exe
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
5e03e3d93a456405952cdadee3018043789f118b871b93d113ce371c079f19dd.sample
-
Size
91KB
-
MD5
b0008e752f488d7e97a8d2452411527e
-
SHA1
56d655932ebbf59bfcc49ca2afc78db16cb7b889
-
SHA256
5e03e3d93a456405952cdadee3018043789f118b871b93d113ce371c079f19dd
-
SHA512
667bca43c63e1602aeb61bcf72eb9dbd86ad42063cebe8dc179a46c5bea723abdaafb75b5713f3cbba5e7e610a85b1c50beb47056250016e79a1b8a03d644bdf
Score
10/10
Malware Config
Signatures
-
Detected Netwalker Ransomware 1 IoCs
Detected unpacked Netwalker executable.
Processes:
resource yara_rule sample netwalker_ransomware -
Netwalker family
Files
-
5e03e3d93a456405952cdadee3018043789f118b871b93d113ce371c079f19dd.sample.exe windows x86