Static task
static1
Behavioral task
behavioral1
Sample
dc403cfef757e9bcb3eaa3cc89f8174fc8de5eef64a0e0ee5e5698991f0437f9.sample.exe
Resource
win7v20210410
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
dc403cfef757e9bcb3eaa3cc89f8174fc8de5eef64a0e0ee5e5698991f0437f9.sample.exe
Resource
win10v20210410
0 signatures
0 seconds
General
-
Target
dc403cfef757e9bcb3eaa3cc89f8174fc8de5eef64a0e0ee5e5698991f0437f9.sample
-
Size
3.8MB
-
MD5
f58a00d132205045f8aa4c765239301f
-
SHA1
b931198e02d6bd935c2a3c4f0b1ab8433f8cfefd
-
SHA256
dc403cfef757e9bcb3eaa3cc89f8174fc8de5eef64a0e0ee5e5698991f0437f9
-
SHA512
719b5eab44d7058ba1de4dd247dc39271750a5cd2758a847f5ef38add04213f0a3d4d567aadd8adba7c2f91d4cd23d4ada405b13179fbf80691002d7029c8d71
Score
10/10
Malware Config
Signatures
-
Ekans Ransomware 1 IoCs
Executable looks like Ekans ICS ransomware sample.
resource yara_rule sample family_ekans -
Ekans family
Files
-
dc403cfef757e9bcb3eaa3cc89f8174fc8de5eef64a0e0ee5e5698991f0437f9.sample.exe windows x86