General
-
Target
8f834966a06f34682b78e1644c47ab488b394b80109ddea39fc9a29ed0d56a0c
-
Size
76KB
-
Sample
220201-bvj6nafcc7
-
MD5
3d6203df53fcaa16d71add5f47bdd060
-
SHA1
655352e00c7e478c3fed38bc6f407982dec3768d
-
SHA256
8f834966a06f34682b78e1644c47ab488b394b80109ddea39fc9a29ed0d56a0c
-
SHA512
b8b2863b4152348b94fb69e2061db84197e96904b4e4411a19ff6a82aff71f9177cbeb55dca2eb52d35bdc65ee7f8944361b301b1f28d744bbecaab494410ec2
Static task
static1
Behavioral task
behavioral1
Sample
8f834966a06f34682b78e1644c47ab488b394b80109ddea39fc9a29ed0d56a0c.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
8f834966a06f34682b78e1644c47ab488b394b80109ddea39fc9a29ed0d56a0c.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
C:\D42AB3-Readme.txt
Extracted
C:\Users\All Users\Microsoft Help\D42AB3-Readme.txt
Extracted
C:\EC4959-Readme.txt
Targets
-
-
Target
8f834966a06f34682b78e1644c47ab488b394b80109ddea39fc9a29ed0d56a0c
-
Size
76KB
-
MD5
3d6203df53fcaa16d71add5f47bdd060
-
SHA1
655352e00c7e478c3fed38bc6f407982dec3768d
-
SHA256
8f834966a06f34682b78e1644c47ab488b394b80109ddea39fc9a29ed0d56a0c
-
SHA512
b8b2863b4152348b94fb69e2061db84197e96904b4e4411a19ff6a82aff71f9177cbeb55dca2eb52d35bdc65ee7f8944361b301b1f28d744bbecaab494410ec2
Score10/10-
Detected Netwalker Ransomware
Detected unpacked Netwalker executable.
-
Netwalker Ransomware
Ransomware family with multiple versions. Also known as MailTo.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Sets service image path in registry
-
Deletes itself
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-