General
-
Target
fefd1117c2f0ab88d8090bc3bdcb8213daf8065f12de1ee6a6c641e888a27eab.bin
-
Size
38KB
-
Sample
220311-23y8nacde4
-
MD5
22a006b6d19558c3cebd708b2b0543bc
-
SHA1
2d92468b5982fbbb39776030fab6ac35c4a9b889
-
SHA256
fefd1117c2f0ab88d8090bc3bdcb8213daf8065f12de1ee6a6c641e888a27eab
-
SHA512
821833b5ffbb2f80f12214d969c033c23126fc2f4ef44f30d8b88236906512db5631e029f55d13869a4dc90e7bbee27fcfb8a391300178e4f055e22213d7b97b
Static task
static1
Behavioral task
behavioral1
Sample
fefd1117c2f0ab88d8090bc3bdcb8213daf8065f12de1ee6a6c641e888a27eab.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
fefd1117c2f0ab88d8090bc3bdcb8213daf8065f12de1ee6a6c641e888a27eab.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
C:\NOKOYAWA_readme.txt
Targets
-
-
Target
fefd1117c2f0ab88d8090bc3bdcb8213daf8065f12de1ee6a6c641e888a27eab.bin
-
Size
38KB
-
MD5
22a006b6d19558c3cebd708b2b0543bc
-
SHA1
2d92468b5982fbbb39776030fab6ac35c4a9b889
-
SHA256
fefd1117c2f0ab88d8090bc3bdcb8213daf8065f12de1ee6a6c641e888a27eab
-
SHA512
821833b5ffbb2f80f12214d969c033c23126fc2f4ef44f30d8b88236906512db5631e029f55d13869a4dc90e7bbee27fcfb8a391300178e4f055e22213d7b97b
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-