Static task
static1
Behavioral task
behavioral1
Sample
346fdff8d24cbb7ebd56f60933beca37a4437b5e1eb6e64f7ab21d48c862b5b7.sample.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
346fdff8d24cbb7ebd56f60933beca37a4437b5e1eb6e64f7ab21d48c862b5b7.sample.exe
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
346fdff8d24cbb7ebd56f60933beca37a4437b5e1eb6e64f7ab21d48c862b5b7.sample
-
Size
58KB
-
MD5
d3f44bfe42b2e3c735e9df5bb793b9ef
-
SHA1
bf38aca2c659f9eb2b2fa2fad82ccf55b496b0cb
-
SHA256
346fdff8d24cbb7ebd56f60933beca37a4437b5e1eb6e64f7ab21d48c862b5b7
-
SHA512
47871f4e86596061b7f111b4f981fe12564f22e1400ad0c37ccb4e94192e23b89807790c71068ac13cfc39fd3db87a68db57a286e64d8a0c2f13a3c7ffc70b49
Score
10/10
Malware Config
Signatures
-
Detected Netwalker Ransomware 1 IoCs
Detected unpacked Netwalker executable.
Processes:
resource yara_rule sample netwalker_ransomware -
Netwalker family
Files
-
346fdff8d24cbb7ebd56f60933beca37a4437b5e1eb6e64f7ab21d48c862b5b7.sample.exe windows x86