General
-
Target
5d869c0e077596bf0834f08dce062af1477bf09c8f6aa0a45d6a080478e45512.exe
-
Size
69KB
-
Sample
220530-nv1jvsgah8
-
MD5
c0bf14556a1563cea82f34b0faf70822
-
SHA1
e6e232fa7cc93f11bf63487066adccd02006f214
-
SHA256
5d869c0e077596bf0834f08dce062af1477bf09c8f6aa0a45d6a080478e45512
-
SHA512
0b23ec04e88a5152ed3fbd2d4927f543ea756c269ea06d93daacdd57a5a88bafbb7fb556764bc4a1532dfe2003ba4ad191fc259121d3ce685d76489d7c4afc42
Static task
static1
Behavioral task
behavioral1
Sample
5d869c0e077596bf0834f08dce062af1477bf09c8f6aa0a45d6a080478e45512.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
5d869c0e077596bf0834f08dce062af1477bf09c8f6aa0a45d6a080478e45512.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\Users\Admin\Desktop\331BD1-Readme.txt
netwalker
http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion
http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion
Extracted
C:\Users\Admin\Desktop\9D03EF-Readme.txt
netwalker
http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion
http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion
Targets
-
-
Target
5d869c0e077596bf0834f08dce062af1477bf09c8f6aa0a45d6a080478e45512.exe
-
Size
69KB
-
MD5
c0bf14556a1563cea82f34b0faf70822
-
SHA1
e6e232fa7cc93f11bf63487066adccd02006f214
-
SHA256
5d869c0e077596bf0834f08dce062af1477bf09c8f6aa0a45d6a080478e45512
-
SHA512
0b23ec04e88a5152ed3fbd2d4927f543ea756c269ea06d93daacdd57a5a88bafbb7fb556764bc4a1532dfe2003ba4ad191fc259121d3ce685d76489d7c4afc42
Score10/10-
Netwalker Ransomware
Ransomware family with multiple versions. Also known as MailTo.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Deletes itself
-