Malware Analysis Report

2025-01-18 19:01

Sample ID 220130-jpxhsshacl
Target 59e0260d663814a1a3368794f540a5f366c616b4214a42715d4b5b39263c7c38
SHA256 59e0260d663814a1a3368794f540a5f366c616b4214a42715d4b5b39263c7c38
Tags
19 99 sodinokibi
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

59e0260d663814a1a3368794f540a5f366c616b4214a42715d4b5b39263c7c38

Threat Level: Known bad

The file 59e0260d663814a1a3368794f540a5f366c616b4214a42715d4b5b39263c7c38 was found to be: Known bad.

Malicious Activity Summary

19 99 sodinokibi

Sodinokibi family

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2022-01-30 07:51

Signatures

Sodinokibi family

sodinokibi

Analysis: behavioral1

Detonation Overview

Submitted

2022-01-30 07:51

Reported

2022-01-30 13:03

Platform

win7-en-20211208

Max time kernel

4s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

N/A

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2022-01-30 07:51

Reported

2022-01-30 13:03

Platform

win10-en-20211208

Max time kernel

10s

Max time network

0s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Files

N/A