Static task
static1
Behavioral task
behavioral1
Sample
de04d2402154f676f757cf1380671f396f3fc9f7dbb683d9461edd2718c4e09d.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
de04d2402154f676f757cf1380671f396f3fc9f7dbb683d9461edd2718c4e09d.exe
Resource
win11
Behavioral task
behavioral3
Sample
de04d2402154f676f757cf1380671f396f3fc9f7dbb683d9461edd2718c4e09d.exe
Resource
win10-en-20211014
General
-
Target
sample1.zip
-
Size
44KB
-
MD5
705677226e7ee03d0546e032624186d2
-
SHA1
4894c781c1ed8776f657b5cd9c3e7e5a607f9e14
-
SHA256
80f8525368c2e44c403564a979e4e32aff9247e74aa5f02e206058d648e77bc3
-
SHA512
d87d356440f146ffad821fd7f62a04dbf45cfed2a3380d8eef4d1e124b4bec163fb19b5350dac01fcd3f8c8c4733f5488611a8e47e69c075dfd81192254a02c4
Malware Config
Signatures
-
Detected Netwalker Ransomware 1 IoCs
Detected unpacked Netwalker executable.
Processes:
resource yara_rule static1/unpack001/de04d2402154f676f757cf1380671f396f3fc9f7dbb683d9461edd2718c4e09d netwalker_ransomware -
Netwalker family
Files
-
sample1.zip.zip
Password: infected
-
de04d2402154f676f757cf1380671f396f3fc9f7dbb683d9461edd2718c4e09d.exe windows x86