General
-
Target
4c1ca3c037f6bc8145b341d369f0c62f
-
Size
5.0MB
-
Sample
211210-y57q2abahp
-
MD5
4c1ca3c037f6bc8145b341d369f0c62f
-
SHA1
08c3364d9caec0a5860b588e2de192e62630d0dc
-
SHA256
bf5e8f2528ba9a7d131497fd6ac99f30c10d2bd16ac67476b57db4c02576599f
-
SHA512
801a063f5b83e99fa4fda52295b28f9eacf2fac64b0e3517b7c5759202bd7cb6c05a14461915183580edc5b77ca60485c238849bb7d90cb10ce953de6793a0dd
Static task
static1
Behavioral task
behavioral1
Sample
4c1ca3c037f6bc8145b341d369f0c62f.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
4c1ca3c037f6bc8145b341d369f0c62f.dll
Resource
win10-en-20211208
Malware Config
Targets
-
-
Target
4c1ca3c037f6bc8145b341d369f0c62f
-
Size
5.0MB
-
MD5
4c1ca3c037f6bc8145b341d369f0c62f
-
SHA1
08c3364d9caec0a5860b588e2de192e62630d0dc
-
SHA256
bf5e8f2528ba9a7d131497fd6ac99f30c10d2bd16ac67476b57db4c02576599f
-
SHA512
801a063f5b83e99fa4fda52295b28f9eacf2fac64b0e3517b7c5759202bd7cb6c05a14461915183580edc5b77ca60485c238849bb7d90cb10ce953de6793a0dd
Score10/10-
suricata: ET MALWARE Known Sinkhole Response Kryptos Logic
suricata: ET MALWARE Known Sinkhole Response Kryptos Logic
-
suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1
suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1
-
Executes dropped EXE
-
Drops file in System32 directory
-