General
-
Target
xxx.exe
-
Size
38KB
-
Sample
220213-eak41adec3
-
MD5
2e936942613b9ef1a90b5216ef830fbf
-
SHA1
32c2ecf9703aec725034ab4a8a4c7b2944c1f0b7
-
SHA256
e097cde0f76df948f039584045acfa6bd7ef863141560815d12c3c6e6452dce4
-
SHA512
e0c456502fb397b212fd480cda44cb404bfde11e1392842d4b81059881e3db8f93d8b72bbdb7d35a95680f89ee91022b7662a1902dc6e21be86db0f3c4389e27
Static task
static1
Behavioral task
behavioral1
Sample
xxx.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
xxx.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
C:\NOKOYAWA_readme.txt
Targets
-
-
Target
xxx.exe
-
Size
38KB
-
MD5
2e936942613b9ef1a90b5216ef830fbf
-
SHA1
32c2ecf9703aec725034ab4a8a4c7b2944c1f0b7
-
SHA256
e097cde0f76df948f039584045acfa6bd7ef863141560815d12c3c6e6452dce4
-
SHA512
e0c456502fb397b212fd480cda44cb404bfde11e1392842d4b81059881e3db8f93d8b72bbdb7d35a95680f89ee91022b7662a1902dc6e21be86db0f3c4389e27
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops desktop.ini file(s)
-