General
-
Target
55a32decdd9625245bf064c832962bf2271bff8bb5b8d8fb1bc6ec06dae4aea6
-
Size
148KB
-
Sample
220201-bxlghafce6
-
MD5
d3a3064a627830136702bc0049a7ce0f
-
SHA1
3f23d300afca6d90ef710dc9aeaa44f5e4f362a5
-
SHA256
55a32decdd9625245bf064c832962bf2271bff8bb5b8d8fb1bc6ec06dae4aea6
-
SHA512
a744f192a1cefc0a3bfbdd54d4a78245f8301c6fd7efe0e1eb16cc8a9d63c16b5667b1c003ddbf0a89bad47325acfa3b0bd65eaa638bbe207ef3c8e21c73902e
Static task
static1
Behavioral task
behavioral1
Sample
55a32decdd9625245bf064c832962bf2271bff8bb5b8d8fb1bc6ec06dae4aea6.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
55a32decdd9625245bf064c832962bf2271bff8bb5b8d8fb1bc6ec06dae4aea6.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
C:\Program Files\VideoLAN\VLC\lua\meta\reader\4C2778-Readme.txt
netwalker
http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion
Extracted
C:\odt\F90D05-Readme.txt
netwalker
http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion
Targets
-
-
Target
55a32decdd9625245bf064c832962bf2271bff8bb5b8d8fb1bc6ec06dae4aea6
-
Size
148KB
-
MD5
d3a3064a627830136702bc0049a7ce0f
-
SHA1
3f23d300afca6d90ef710dc9aeaa44f5e4f362a5
-
SHA256
55a32decdd9625245bf064c832962bf2271bff8bb5b8d8fb1bc6ec06dae4aea6
-
SHA512
a744f192a1cefc0a3bfbdd54d4a78245f8301c6fd7efe0e1eb16cc8a9d63c16b5667b1c003ddbf0a89bad47325acfa3b0bd65eaa638bbe207ef3c8e21c73902e
Score10/10-
Netwalker Ransomware
Ransomware family with multiple versions. Also known as MailTo.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-