General
-
Target
227c0e41aa7ff9068af59279585a7125b9aa62882e1153af1eefa08387a3a856
-
Size
5.0MB
-
Sample
220612-fqmhfafdgl
-
MD5
9e883ca98bfa04f765894992bf33068b
-
SHA1
bfa21956072b49ecc307276bf15049d264c8419e
-
SHA256
227c0e41aa7ff9068af59279585a7125b9aa62882e1153af1eefa08387a3a856
-
SHA512
daa3a69a5aaf1c6bbce9ce59908a153e6ef542d5bf780e9600f19e20b0f79186072c1721ddf9d63cd6a3fec0575181aca02c9d2230532473bb0a69b39d4ac16a
Static task
static1
Behavioral task
behavioral1
Sample
227c0e41aa7ff9068af59279585a7125b9aa62882e1153af1eefa08387a3a856.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
227c0e41aa7ff9068af59279585a7125b9aa62882e1153af1eefa08387a3a856.dll
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
227c0e41aa7ff9068af59279585a7125b9aa62882e1153af1eefa08387a3a856
-
Size
5.0MB
-
MD5
9e883ca98bfa04f765894992bf33068b
-
SHA1
bfa21956072b49ecc307276bf15049d264c8419e
-
SHA256
227c0e41aa7ff9068af59279585a7125b9aa62882e1153af1eefa08387a3a856
-
SHA512
daa3a69a5aaf1c6bbce9ce59908a153e6ef542d5bf780e9600f19e20b0f79186072c1721ddf9d63cd6a3fec0575181aca02c9d2230532473bb0a69b39d4ac16a
Score10/10-
suricata: ET MALWARE Known Sinkhole Response Kryptos Logic
suricata: ET MALWARE Known Sinkhole Response Kryptos Logic
-
suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1
suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1
-
Contacts a large (2296) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Contacts a large (910) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE
-
Drops file in System32 directory
-