General
-
Target
e35d0d61c0a6ba265e826435eb222ade8272668df6094595fd6a9a21b3f843c3
-
Size
65KB
-
Sample
220201-bqm2raeffl
-
MD5
17c00e51b802ca73c3fe75dc4fc9c4f3
-
SHA1
df10c7190b811a19abaf3814520a3a78bb0e5194
-
SHA256
e35d0d61c0a6ba265e826435eb222ade8272668df6094595fd6a9a21b3f843c3
-
SHA512
4c6cfb7d149be0db7eca2b4f8d6d31d737e134e72956d32154641aaa7ff048b2ee917bb4981bdca3c16c20149ac8f2f46af1582ed72085339513ad187b935cdd
Static task
static1
Behavioral task
behavioral1
Sample
e35d0d61c0a6ba265e826435eb222ade8272668df6094595fd6a9a21b3f843c3.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
e35d0d61c0a6ba265e826435eb222ade8272668df6094595fd6a9a21b3f843c3.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
C:\Users\Admin\1A5864-Readme.txt
netwalker
http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion
Extracted
C:\odt\D5105E-Readme.txt
netwalker
http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion
Targets
-
-
Target
e35d0d61c0a6ba265e826435eb222ade8272668df6094595fd6a9a21b3f843c3
-
Size
65KB
-
MD5
17c00e51b802ca73c3fe75dc4fc9c4f3
-
SHA1
df10c7190b811a19abaf3814520a3a78bb0e5194
-
SHA256
e35d0d61c0a6ba265e826435eb222ade8272668df6094595fd6a9a21b3f843c3
-
SHA512
4c6cfb7d149be0db7eca2b4f8d6d31d737e134e72956d32154641aaa7ff048b2ee917bb4981bdca3c16c20149ac8f2f46af1582ed72085339513ad187b935cdd
Score10/10-
Netwalker Ransomware
Ransomware family with multiple versions. Also known as MailTo.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-