General
-
Target
21a77e00627ddd6541f559651be67482ce29b079969379038b5ea5424c275cab
-
Size
141KB
-
Sample
220612-jrfcascdhr
-
MD5
38bd1d49f88201a9a6a92ae3f65559c0
-
SHA1
010847f30975fbac9a45ffc6e70ed640614e4852
-
SHA256
21a77e00627ddd6541f559651be67482ce29b079969379038b5ea5424c275cab
-
SHA512
4ff916f7ea78fbd0c0fbb663dc53d8a6060fae819a7f0da09d114d832dde1634943cb603787954fdb0a5fbae20bcc0a2d29157f7b7a1139c8f41424a655db858
Static task
static1
Behavioral task
behavioral1
Sample
21a77e00627ddd6541f559651be67482ce29b079969379038b5ea5424c275cab.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
21a77e00627ddd6541f559651be67482ce29b079969379038b5ea5424c275cab.dll
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
21a77e00627ddd6541f559651be67482ce29b079969379038b5ea5424c275cab
-
Size
141KB
-
MD5
38bd1d49f88201a9a6a92ae3f65559c0
-
SHA1
010847f30975fbac9a45ffc6e70ed640614e4852
-
SHA256
21a77e00627ddd6541f559651be67482ce29b079969379038b5ea5424c275cab
-
SHA512
4ff916f7ea78fbd0c0fbb663dc53d8a6060fae819a7f0da09d114d832dde1634943cb603787954fdb0a5fbae20bcc0a2d29157f7b7a1139c8f41424a655db858
Score10/10-
suricata: ET MALWARE Locky CnC Checkin HTTP Pattern
suricata: ET MALWARE Locky CnC Checkin HTTP Pattern
-
Blocklisted process makes network request
-
Sets desktop wallpaper using registry
-