General
-
Target
1c0b42adec440aa0bf93afaf3b4bc1db298582a0b645fc7d383914aa9fe3f4d6
-
Size
184KB
-
Sample
220607-t9wgcaghhj
-
MD5
6bf3cc80a4a40f403d0d6d341d3b06b9
-
SHA1
c7ab9915a7e5b4a1396fc57262e91b2a38612eee
-
SHA256
1c0b42adec440aa0bf93afaf3b4bc1db298582a0b645fc7d383914aa9fe3f4d6
-
SHA512
b3e0baff8d994a23539c1b1ae909b5440d224ac65cd0034306c8f448f574d0a99e2d3ee1c8e67c66bf97172fe55bacf3674d6163d31f5b01c034bb955a161fec
Static task
static1
Behavioral task
behavioral1
Sample
1c0b42adec440aa0bf93afaf3b4bc1db298582a0b645fc7d383914aa9fe3f4d6.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1c0b42adec440aa0bf93afaf3b4bc1db298582a0b645fc7d383914aa9fe3f4d6.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
1c0b42adec440aa0bf93afaf3b4bc1db298582a0b645fc7d383914aa9fe3f4d6
-
Size
184KB
-
MD5
6bf3cc80a4a40f403d0d6d341d3b06b9
-
SHA1
c7ab9915a7e5b4a1396fc57262e91b2a38612eee
-
SHA256
1c0b42adec440aa0bf93afaf3b4bc1db298582a0b645fc7d383914aa9fe3f4d6
-
SHA512
b3e0baff8d994a23539c1b1ae909b5440d224ac65cd0034306c8f448f574d0a99e2d3ee1c8e67c66bf97172fe55bacf3674d6163d31f5b01c034bb955a161fec
Score10/10-
suricata: ET MALWARE Locky CnC Checkin HTTP Pattern
suricata: ET MALWARE Locky CnC Checkin HTTP Pattern
-
suricata: ET MALWARE Locky CnC checkin Nov 21 M2
suricata: ET MALWARE Locky CnC checkin Nov 21 M2
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-